CompTIA IT Fundamentals + (ITF+)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is a typical speed for a mid-range CPU to run at? A. Around 2 GHz; budget models might run as low as 1 GHz, while faster ones run at 3 or 4 GHz. B. Around 2 MHz, if you overclock it. Most still run at 1 MHz. C. Around 4 GHz for each core processor. D. 1.21 Gigawatts.

A. Around 2 GHz; budget models might run as low as 1 GHz, while faster ones run at 3 or 4 GHz. The CPU speed, or processor speed, is the amount of cycles that a CPU can perform per second. This is otherwise known as a Hertz. The current processors are around 2 GHz to 4 GHz of cyclical speed. 2 MHz is significantly slower than 2GHz. Many factors inside and outside of the CPU significantly impact the CPU and overall system performance. Overclocking is the practice of pushing the processor to run faster than it was manufactured to run. 4 GHz is a little high as of right now. Modern CPUs typically have multiple cores, such as dual-core, quad-core, and even 6-core CPUs that run in tandem. Gigawatts is not a measure of CPU speed, despite popular culture lore. Cyclical rates of CPUs are measured in Hz. Lesson 10: System Components

What part of the process of data analytics is most closely supported by meaningful reporting? A. Insights B. Data C. Information D. Correlation The presentation of information in a meaningful output is the outcome of data correlation. It is where you put it into suitable reporting format in order to make a meaningful data-driven business decision.

A. Insights The presentation of information in a meaningful output is the outcome of data correlation. It is where you put it into suitable reporting format in order to make a meaningful data-driven business decision. Lesson 6: Using Data Types and Lessons

Which data type provides for whole numbers only? A. Integer B. Binary C. Hexadecimal D. Secondary

A. Integer The integer data type is for whole numbers expressed in decimal notation (0-9). Lesson 6: Using Data Types and Lessons

What type of mouse would you recommend for someone who uses their computer principally to play computer games and why? A. Laser mouse — this registers cursor movements more quickly and accurately. B. Mechanical mouse — it requires less wrist movement and you don't need a mouse pad. C. A stylus mouse — as its accuracy is high and can easily be moved around the input field. D. Optical mouse — it senses movement relative to a surface using light instead of a roller ball.

A. Laser mouse — this registers cursor movements more quickly and accurately. A laser mouse with an optimal surface can be used because it uses an infrared laser, giving greater precision than an optical mouse. The traditional mechanical mouse contains rollers to detect the movement of a ball housed within the mouse case. Mechanical mice are prone to issues, because of dirt buildup on the roller pads. A stylus mouse is a pen-like device usually coupled with a special drawing pad. It is used for artistic rendering, and would not be effective for computer games. An optical mouse is a computer mouse which uses a light source, typically a light-emitting diode, and a light detector, such as an array of photodiodes, to detect movement relative to a surface. This option is not as accurate as a laser mouse. Lesson 11: Using Device Interfaces

What type of legal protection could be obtained for a novel software algorithm? A. Patent provides the best protection as it can enforce ownership even if someone tries to write the algorithm in a slightly different way. B. Trademark provides the best protection as it can enforce ownership to protect the unique elements of a software algorithm. C. You can only copyright the name not the software algorithm itself. The copyright will make you the sole owner of that brand. D. You can't legally protect a novel software algorithm. It will be owned by the original publisher of the software that you used to create it. You can legally protect a novel software algorithm through both a copyright and a patent. The difference being that you do not have to actually create a product (just the idea) for a patent.

A. Patent provides the best protection as it can enforce ownership even if someone tries to write the algorithm in a slightly different way. You can legally protect a novel software algorithm through both a copyright and a patent. The difference being that you do not have to actually create a product (just the idea) for a patent. Lesson 6: Using Data Types and Lessons

What three things define an object? A. Properties, attributes, and methods B. Branches, loops, and operators. C. Data, information, and insights D. Stored value, class, and interface

A. Properties, attributes, and methods An object is defined by three things: Attributes, methods, and properties. Attributes are values and data types that define the object. Methods define what you can do to an object. Properties represent an alternative way of accessing a field publicly. Lesson 8: Programming and App Development

What shows the structure of code without using the specific syntax of any one language? A. Pseudocode B. Variables C. Functions D. Conditional statements

A. Pseudocode Pseudocode is a code-like language that does not use a specific syntax for a particular programming language. It contains many of the same features (like variables, functions, and conditional statements) but it is generic and can be used as a guide to developing the actual source code. Lesson 8: Programming and App Development

What compatibility information should you confirm before installing a software application? A. That it works with the version of the operating system that you have, and that your computer meets the system (hardware) requirements. B. That you read the End User License Agreement (EULA) and agree to the terms of the license agreement. C. That you select the "repair" option if the software program has stopped working properly. D. That you review the advanced options and select specific feature sets.

A. That it works with the version of the operating system that you have, and that your computer meets the system (hardware) requirements. The software installation best practices include verifying that the software is compatible with your operating system and that your computer hardware meets the recommended requirements. Additionally, read the accompanying documentation to verify any special installation instructions. Lesson 7: Using Apps

A friend is asking for your help in using her computer. When your friend presses the key marked @, the " symbol appears. What could be the cause? A. The keyboard is set to use a UK layout. B. Somebody has moved a key to a different place on the keyboard. C. The Shift button doesn't work properly. D. The keyboard is broken.

A. The keyboard is set to use a UK layout. The UK keyboard layout has some variations from the standard US layout, such as the " symbol instead of @. You can switch it to the US Setting via the Language Bar. It is more likely that her language is set incorrectly. It is difficult, but somebody could be playing a prank on her and moved her key; however, this is likely not the problem. Since she receives a symbol back when holding the Shift key and pressing the number 2, then her Shift key is working properly. Getting a new keyboard will not resolve her issue if she doesn't change her language settings. The same thing will happen with her new keyboard. Lesson 11: Using Device Interfaces

How can a client-server application architecture be described if it could be re-developed to split the application and presentation layers? A. This could be described as a two-tier application capable of becoming a tier-three application. B. This could be described as a one-tier application capable of becoming a tier-two application. C. This could be described as a three-tier application capable of becoming a n-tier application. D. This could be described as a n-tier application that cannot be further re-developed.

A. This could be described as a two-tier application capable of becoming a tier-three application. This is a two-tier application that can be redesigned into a three-tier application by specifying presentation, application, and data layers. Client-server applications can progress over time from one-tier up to n-tier structures through re-development. With each increased tier, the client/server application becomes more complex. A one-tier application can be re-developed into a two-tier application by separating the database engine from the business logic. A three-tier application already has the application and presentation layers split. Further re-development into an n-tier application architecture is possible by implementing an even more complex architecture, like using separate access controls. A two-tier application can be re-developed to split the application and presentation layers, resulting in a three-tier application. The term n-tier can apply to both two-tier and three-tier applications; however, the scenario describes the potential for further re-development. Lesson 9: Using Databases

What term is used to describe terminating a process that is not responding to user input? A. This is often called "killing" the process. B. This is often called "exterminate" the process. C. This is called "choking" the process. D. This is called "process abort."

A. This is often called "killing" the process. The term used to describe terminating a process that is not responding to user input is "killing" the process. Kill causes an abnormal process termination and should be used only when necessary as data may be lost when closing applications this way. Lesson 4: Managing an OS

Which of these statements is FALSE regarding the Windows 10 versions available? A. Windows 10 Enterprise is similar to the Pro edition but designed for licensing by small businesses. B. Windows 10 Pro comes with extra networking and management features. C. Windows 10 Home is designed for domestic consumers. D. Windows 10 Education/Pro Education is for schools and colleges.

A. Windows 10 Enterprise is similar to the Pro edition but designed for licensing by small businesses. Windows 10 Enterprise/Windows 10 Enterprise (Long Term Servicing Channel) is similar to the Pro edition but it is designed for licensing by large businesses. Lesson 3: Using an OS

What is the best way to install a web application on your computer? A. You do not install a web application on your computer. You access it through your browser. B. Go to the vendor's website and have them mail it to you and install it when the disk arrives. C. Download it from the browser and install it on the computer. D. Call in an IT specialist to come install it for you.

A. You do not install a web application on your computer. You access it through your browser. You do not install a web application on your computer. The purpose of a web application is to access it through your browser over the Internet or through a local network. Lesson 8: Programming and App Development

You want to check whether a condition has been met, and if it has, perform one action. Otherwise, you want your program to perform a second action. What sort of programming operation would help achieve this? A. A programming identifier B. A conditional branch C. A simple array D. A continuous loop

B. A conditional branch Branches are instructions to your computer to execute a different sequence of instructions based on a condition. In this scenario, the conditional branch being used is called an IF-THEN-ELSE statement. Lesson 8: Programming and App Development

How does a markup language differ from a compiled language? A. A compiled language is not a programming language, rather it is a way of using nested tags within a document to describe its structure and contents. B. A markup language is not a programming language, rather it is a way of using nested tags within a document to describe its structure and contents. C. A markup language is a programming language and is commonly used to retrieve data from a database. D. A compiled language is a programming language and is commonly used to retrieve data from a database.

B. A markup language is not a programming language, rather it is a way of using nested tags within a document to describe its structure and contents. A markup language is not considered a programming language. It uses nested tags within a document to describe its structure and contents. Compiled languages, like C++, use syntax to perform actions which are compiled and linked resulting in an executable file. Lesson 8: Programming and App Development

The Task Scheduler allows you to run a process automatically in Windows. What is a widely-used Linux equivalent? A. Taskkill B. Cron C. Vi D. Nano

B. Cron Linux uses cron to do task scheduling. It typically automates system maintenance or administration though its general-purpose nature makes it useful for things like downloading files from the Internet and downloading email at regular intervals. Lesson 4: Managing an OS

Which of these statements is true regarding how you set up your display? A. Dots Per Inch (DPI) or scaling is configured via the Personalization applet. B. Dots Per Inch (DPI) or scaling is configured via Display settings. C. Dots Per Inch (DPI) is determined by the monitor and device driver and cannot be user configured. D. Dots Per Inch (DPI) or scaling is configurable using your computers IP-based interface.

B. Dots Per Inch (DPI) or scaling is configured via Display settings. Dots Per Inch (DPI) or scaling is configured via Display properties settings. This can be accessed by right clicking on the Desktop and clicking "Display settings. Lesson 12: Using Peripheral Devices

What is it that defines the relationship between tables in an RDBMS? A. Each table contains a foreign key whose value is unique for each record in the table. A foreign table can use the value of a foreign key as a relation, storing the value in a primary key field. B. Each table contains a primary key whose value is unique for each record in the table. A foreign table can use the value of a primary key as a relation, storing the value in a foreign key field. C. A schema is used to define relationships between tables. D. A constraint defines the relationship between tables.

B. Each table contains a primary key whose value is unique for each record in the table. A foreign table can use the value of a primary key as a relation, storing the value in a foreign key field. In an RDBMS, the primary and foreign keys define the relationship between tables. Each table contains a primary key whose value is unique for each record in the table. A foreign table can use the value of a primary key as a relation, storing the value in a foreign key field. Each table has a primary key that is unique to each record in the table. In a foreign table, the primary key of the original table is stored as a foreign key. A schema is used to define the structure of your database. The schema is not used to define relationships between tables. A constraint is something imposed on values that can be input into each field of a table. A constraint does not define the relationship between tables. Lesson 9: Using Databases

How would you access the system setup program on a PC? A. Historically, by pressing and holding the Windows key (4 little white boxes) on your keyboard. Modern PCs use the function key "F5" B. Historically, by pressing the appropriate key during startup (ESC, DEL, F1, F2, or F10). Modern PCs often use fast boot modes that require some other means of booting to the firmware setup program. C. Logically, by pressing CTL+ALT+DEL twice during startup. Just like when you want to exit a program on your PC. D. Logically, by pressing ALT+F4 during startup will access the startup menu through windows.

B. Historically, by pressing the appropriate key during startup (ESC, DEL, F1, F2, or F10). Modern PCs often use fast boot modes that require some other means of booting to the firmware setup program. Some older legacy PCs still use (ESC, DEL, F1, F2, or F10). Manufacturers have begun selling computers with fast boot which requires additional steps to access the firmware setup application. For example, Shift+click the Restart button from the windows logon screen to access UEFI boot options. The Windows key will take you to the system configuration GUI that will allow you to choose how to boot but it is still a process within Windows, not the BIOS. Pressing CTL+ALT+DEL twice is a hotkey put in place to help with your computer if it gets hung up. It will allow you to break activities and will restart your computer. Just like CTL+ALT+DEL interrupts the operating system, ALT+F4 closes the current window. This does not help access BIOS settings. Lesson 10: System Components

What is the advantage of a local network hosted application, in terms of data storage? A. If data is stored on the server and not on the local workstation, it will be available to the user if a network device fails. B. If data is stored on the server and not on the local workstation, it is easier to apply access controls and to back it up. C. If data is stored on the server and not on the local workstation, it will be available during power outages. D. If data is stored on a local network storage device and not on the local workstation, many different users will be able to access the information.

B. If data is stored on the server and not on the local workstation, it is easier to apply access controls and to back it up. If data is stored on the server and not on the local workstation, it is easier to apply access controls and to back it up. Having user data consolidated on a server gives administrators the ability to run data backup routines, which are a safeguard in case of hardware failure. Access controls are also easier to implement when files are on the server. Lesson 8: Programming and App Development

Why would Windows prompt you to enter a password if you try to install a software application? A. Installing an application requires the use of the application's setup files which may require specific user privileges to access. B. Installing an application requires administrator privileges and is an action protected by User Account Control C. Installing an application requires a second level of verification. An administrator verifies a standard user and a second administrator can verify the first one. D. Installing an application requires that you have exited other applications so that the antivirus software can be disabled.

B. Installing an application requires administrator privileges and is an action protected by User Account Control Installing an application requires elevated privileges. As a standard user, the User Account Control (UAC) will prompt for credentials of an authorized account. If you were logged on as an administrator already, you might have to enter the password on a domain; if you were logged on as an ordinary user, you would have to enter the administrator's username and password. Lesson 7: Using Apps

You are considering buying a new display device. The model you are considering accepts digital inputs only. Your computer's graphics adapter has a blue port with 15 holes. Would this flat panel be a wise purchase? A. Yes, as this connector is DVI which supports digital only. B. No, as this connector is VGA which supports analog output only. C. Yes, as this connector is HDMI which supports both digital and analog. D. No, as this connector is DisplayPort which supports analog output only.

B. No, as this connector is VGA which supports analog output only. Knowing and understanding what interfaces are available on your computer is important. In this case, you don't have digital video because your computer uses VGA only. VGA connections only support an analog output. A blue port with 15 holes is an analog VGA port, not a digital DVI port. A female DVI port will likely be white in color. The blue port is not an HDMI port. HDMI ports can be identified as rectangular in shape where one of the long edges protrudes further out then the other. Often times, the letters HDMI are printed near the port. DisplayPort connectors can be identified by the letters DP or DP++ near the port. DisplayPort is a digital interface. Lesson 11: Using Device Interfaces

You need to configure settings for an input device. What should be your first step? A. Configure the wireless adapter to connect to the new input device. B. Open the Settings app or Control Panel. C. Go to the Printers and Scanners tab in system setting. D. Open the Settings add or remove programs.

B. Open the Settings app or Control Panel. If you need to configure settings for an input device your first step should be to go to the Settings app or Control Panel to connect that new input device. The wireless adapter will connect you to the internet. It is not used to connect peripheral devices to your computer. Some of the newer computers can connect to peripheral devices using Bluetooth connectivity but you would not configure that at the wireless adapter. The Printers and Scanners tab in the system setting will only help you with a scanner input. It is primarily used to control the printer output of your computer. If you are planning to add an input device, you do not want to go to add and remove programs because it's a device not a program. Lesson 11: Using Device Interfaces

You have just bought a new computer but want to use the older version of Windows that came with your previous computer. Windows was provided as an OEM license. Can you use this license key to install the software on your new PC? A. Original Equipment Manufacturer (OEM) licenses can only be used on the brand and model it was initially installed on. B. Original Equipment Manufacturer (OEM) licenses can be transferred between different computers, just not at the same time. C. Original Equipment Manufacturers (OEM) licenses are only used in Enterprise environments, prohibiting use on a new computer. D. Original Equipment Manufacturer (OEM) licenses are authorized for use on multiple computer systems at the same time, enabling use on the new computer.

B. Original Equipment Manufacturer (OEM) licenses can be transferred between different computers, just not at the same time. Original Equipment Manufacturer (OEM) software is licensed with the computer system on which it was originally installed, and is tied to that original machine. It is a single-use license that is not intended to be used on any other computer. Lesson 7: Using Apps

You need a development environment with a library of database functions. What type of interface are you using? A. Direct/Manual Access B. Programmatic access C. Query/Report Builder D. Utility Access

B. Programmatic access Programmatic access is where a software application can interact with the database either using SQL commands or using SQL commands stored as procedures in the database. Most programming languages include libraries to provide default code for connecting to a database and executing queries. Manual access is where administrators might use an administrative tool such as phpMyAdmin to connect and sign in to an RDBMS database. Once they have connected, they can run SQL commands to create new databases on the system and interact with stored data. Query is done when there are many users who may need to interact closely with the database but do not want to learn SQL syntax. A query or report builder provides a GUI for users to select actions to perform on the database and converts those selections to the SQL statements that will be executed. Utility Access happens when an application might use a database "in the background" without the user really being aware of its presence. Alternatively, the application might provide a specific Graphical User Interface (GUI) or form to allow ordinary users to add and search records. Lesson 9: Using Databases

What are constants and variables examples of? A. Simple arrays B. Programming identifiers C. Conditional branches D. Continuous loops

B. Programming identifiers An identifier is used in a program to access a program element, such as a stored value, class, method, or interface. For example, you might assign the identifier FirstName to a stored value that contains a user's first name. In essence, an identifier is a label for something within your program. If your identifier stores data, then it will be either a variable or a constant. Lesson 8: Programming and App Development

What type of software manages tasks, dependencies, and timelines? A. Accounting software B. Project management software C. Database software D. Business-specific applications

B. Project management software Project management software is software used for project planning, scheduling, resource allocation and change management. It allows project managers (PMs), stakeholders and users to control costs and manage budgeting, quality and documentation. It may also be used as an administration system. Lesson 7: Using Apps

Which of these statements is true regarding a standard user and their password? A. Standard users must get permission from the administrator to change a password. B. Standard users can change their own password but cannot change anyone else's password. C. Once a standard user sets their first password they cannot change or modify it. D. Password management is automatically controlled in the BIOS.

B. Standard users can change their own password but cannot change anyone else's password. Ordinary users have the ability to change their password whenever they want. Just go to system settings, then sign in options-- and click the change tab under password. Lesson 4: Managing an OS

What language is usually used to request data from an RDBMS such as Oracle? A. eXtensible Markup Language (XML) is used to query RDMBS-based database platforms. B. Structured Query Language (SQL) is used to query RDBMS-based database platforms. C. Hypertext Markup Language (HTML) is used to query RDBMS-based database platforms. D. Java is used to query RDBMS-based database platforms.

B. Structured Query Language (SQL) is used to query RDBMS-based database platforms. The Structured Query Language (SQL) is designed to retrieve specific records from a dataset. This is accomplished using the Data Definition Language (DDL) commands which are SQL commands that add to or modify the structure of a database. eXtensible Markup Language (XML) was designed to store and transport data. XML was also designed to be both human- and machine-readable. Hypertext Markup Language (HTML) is a language used to serve HTML web pages using coded tags to describe how the page should be formatted. Java is a general-purpose computer-programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible. General purpose programming languages can access database information using SQL queries. Lesson 9: Using Databases

Why might one of your first tasks on receiving a new computer be to remove software applications? A. The computer may already have a virus pre-installed that you do not want. B. The computer may be bundled with pre-installed software that you do not want. C. The computer may have spyware bundled in that will watch every action that do on your computer. D. The computer may not have enough storage left to run any of the software applications.

B. The computer may be bundled with pre-installed software that you do not want. Manufacturers attempt to load pre-installed applications with the sale of their computers to provide functionality for what the majority of the consumers like and use. What everybody wants may not be what you want. Lesson 7: Using Apps

Which is a true statement regarding whether or not laptops make good servers? A. Their size and weight make them perfect for a server rack, and this allows for better cooling. B. There is no room for expansion, and you are paying for components and a design that isn't practical. C. Their redundancy makes them reliable, particularly during power outages. D. Their mobility allows for more flexibility in where you store the server.

B. There is no room for expansion, and you are paying for components and a design that isn't practical. The reason laptops don't make good servers is because they are optimized to be small, and because of this, there is no room for expansion. Furthermore, they are not exactly meant to be used for extended periods of time. Overheating and battery life can be problematic. Their size and weight do not make them ideal for server racks (they are just too small). There is absolutely no room for redundancy in laptop computers. While mobility is the key to a good laptop, it doesn't usually make for a good server. Lesson 1: Common Computing Devices

Following installation of an application, another program on your computer has stopped working. What could you do to try to fix it? A. Try using the Turn Windows features on or off dialog tab from Programs and Features (if available). B. Try using the Repair option in Programs and Features (if available) or re-installing the program. C. Try using the software components tab under Device Manager to fix the problem. D. Log into User Account Control to edit the settings in the control panel and reduce the security posture. It may have blocked the other program.

B. Try using the Repair option in Programs and Features (if available) or re-installing the program. If a software program stops working, the best solution is usually to uninstall then reinstall it. Some programs may also support a Repair option, which can be a bit quicker and preserve your custom settings. Lesson 7: Using Apps

What is the technical term for a web address? A. Hyperlink (HL) B. Uniform Resource Locator (URL) C. Address bar D. Website name

B. Uniform Resource Locator (URL) The Uniform Resource Locator (URL) is the technical term for a web address; however, Uniform Resource Identifier (URI) is now preferred in web standards documentation. Despite web standards, URL is more widely known and used. A hyperlink is a word, phrase, or image that you can click on to "jump" to a new document or different website. The address bar is the space in the window of a web browser that is used to display the address of a website. A URL can be entered into the address bar. A website name is not necessarily the same as the URL. Some websites use abbreviated URLs that are not identical to the name of the website. Lesson 3: Using an OS

Which method does a technician use to configure and improve a system's memory usage? A. Users do not configure any of the system memory setup because the OS handles all system memory activities. B. Use of virtual memory or a pagefile, where disk space is used to supplement system RAM. C. Use of general system memory, where a percentage of memory can be allocated to specific applications. D. Use of mass storage, where disks can be partitioned to separate OS files from user files.

B. Use of virtual memory or a pagefile, where disk space is used to supplement system RAM. Pagefile is also known as the swap file, or virtual memory file. It's a file that Windows uses as Virtual Memory. Virtual Memory is disk space Windows uses when it runs out of physical memory, or RAM. Lesson 4: Managing an OS

What protection feature in Windows is designed to prevent a script or software from making unauthorized changes to the OS configuration? A. Graphical User Interface (GUI) B. User Account Control (UAC) C. Default account types D. Password options

B. User Account Control (UAC) User Account Control (UAC) is the protection feature in windows that prevents scripts or other software from performing administrative tasks without authorization. Using UAC, the user must input their credentials or click through an authorization prompt before configuration changes can be made. Lesson 4: Managing an OS

In order to obtain support on a currently installed application, the software vendor wants to know the application's product ID. How would you locate this information? A. Look in the Warranty information packet. B. Usually via the Help > About menu. C. Open the System Settings menu. D. Search manufacturer's website.

B. Usually via the Help > About menu. Manufacturers will reference model number or a service code for service support. The model number or service code, usually located via the Help > About menu, will assist you in finding information specific to the computer system that you are working on. Lesson 7: Using Apps

Which type of display interface does NOT support High Definition picture resolution? A. HDMI B. VGA C. Thunderbolt D. DVI

B. VGA High-definition video is video of higher resolution and quality than standard-definition. Of the listed options VGA is the only option that does NOT support high definition. High Definition Multimedia Interface (HDMI) is a widely used interface that supports high definition picture resolutions. Thunderbolt is used on Apple products and can provide 5K resolution with 14.7 million pixels. DVI supports a High Definition picture resolution. Single link DVI employs a single 165 MHz transmitter that supports resolutions up to 1920 ◊ 1200 at 60 Hz. Dual link DVI increases the bandwidth and supporting resolutions up to 2560 ◊ 1600 at 60 Hz. Lesson 11: Using Device Interfaces

In a program, what does a loop do? A. A loop is a container that can be used as a term to reference multiple values or elements. B. A loop accesses a program element, such as a stored value, class, method, or interface. C. A loop performs one or more instructions until a condition is met. D. Loops grow or shrink in size as elements are added or removed.

C. A loop performs one or more instructions until a condition is met. In computer programming, a loop is a sequence of instructions that is continually repeated until a certain condition is reached. Typically, a certain process is done, such as getting an item of data and changing it, and then some condition is checked such as whether a counter has reached a prescribed number. Lesson 8: Programming and App Development

What type of computer is best suited for using in a job where you have to make notes and be able to move around easily? A. Desktop computer with an electronic stylus. B. A server that is mounted on a cart for easier mobility. C. A tablet or smartphone or possibly a hybrid laptop/tablet. D. Gaming console with voice activated commands. .

C. A tablet or smartphone or possibly a hybrid laptop/tablet. The best computer suited for a job where you take notes and move around a lot is a tablet or smartphone. Furthermore, they are good for keeping you connected to all your favorite social networks. A smartphone will enable you to use Internet search engines on the move, shop at online stores, and bring all the latest news and sports into your hand. Servers are just too big to be used for this type of activity. Even if you put it on a cart, most servers require a separate keyboard/video/monitor (KVM) remote device to use them. A desktop computer would be too cumbersome to take notes on and move around with even if you had an electronic stylus. A gaming console is best suited for playing video games. Lesson 1: Common Computing Devices

What systems use a Central Processing Unit (CPU) and memory? A. Desktops only B. Servers only C. All types of computers D. Laptops only

C. All types of computers A Central Processing Unit (CPU) and memory are used by all types of computers including servers, desktops, and laptops. The CPU retrieves each instruction or data file from memory and processes it. After, the CPU writes the results back to memory and directs other components to perform actions. Servers are a type of computer that uses a CPU and system memory along with desktops and laptops. Desktops are a type of computer that uses a CPU and system memory along with servers and laptops. A laptop is a type of computer that uses a CPU and system memory along with servers and desktops. Lesson 1: Common Computing Devices

A user has two USB drives connected to her PC. She complains that when she copies large files to both drives at the same time, it seems to take much longer. Why might this be? A. Writing to USB drives can only occur one at a time. B. The flash drive partitions haven't been formatted. C. Bandwidth on the USB bus is shared between all devices. D. She has the cables swapped backwards.

C. Bandwidth on the USB bus is shared between all devices. Bandwidth, also called throughput, refers to the total amount of data that can theoretically be transferred on the bus in a given unit of time. All devices on the Universal Serial Bus (USB) have to share this throughput. A partition is a part of a disk drive that is separate from the rest of the drive. Typically, Windows will not allow you to partition a USB flash drive because flash drives are removable media. USB allows more than one device to be used at any given time. To say that you can't use multiple drives is like saying you can only drive one car on a highway. Cable connectors rarely fit into a socket in a backwards manner. Connecting a cable backwards is impossible. Lesson 11: Using Device Interfaces

What three scripting options are commonly used in Windows 10 to perform administrative tasks? A. PowerCLI, Perl, and Python B. Mocha, LiveScript, and JavaScript C. Batch files, Windows PowerShell scripts, and VBScripts D. AppleScript Editor, Xcode, and Smile

C. Batch files, Windows PowerShell scripts, and VBScripts Batch files, Windows PowerShell scripts, and VB Scripts are the three scripting options commonly used in Windows 10 to perform administrative activities and other tasks. Lesson 8: Programming and App Development

What key combination can you use to force the browser to ignore any locally cached files when refreshing a page? A. Ctrl++ B. Crtl+Alt+Del C. Ctrl+F5 D. Alt+F4

C. Ctrl+F5 When browsing the web, holding Ctrl and pressing F5 instructs the browser to perform a refresh but to ignore the locally cached files. This forces the browser to retrieve the newest copy of the website from the web server. Lesson 3: Using an OS

An INSERT statement is an example of what data language type? A. Both Data Manipulation Language and Data Definition Language B. Data Definition language C. Data Manipulation Language D. Neither Data Manipulation Language nor Data Definition Language

C. Data Manipulation Language Data Manipulation Language (DML) commands allow you to insert or update records and extract information from records for viewing. Data Definition Language (DDL) commands refer to SQL commands that add to or modify the structure of the database. Therefore, the INSERT statement is part of DML because it depends on the structure of a table (columns, data types, and constraints) being established already. Data Definition Language (DDL) commands add to or modify the structure of a database. The INSERT statement manipulates an existing structure. A statement must be either a Manipulation or a Definition statement, not both. The INSERT statement fits the definition of a Data Manipulation Language because it inserts records into a pre-existing structure. Lesson 9: Using Databases

What type of computer is most likely to need peripheral devices? A. Smartphone B. Laptop C. Desktop D. Server

C. Desktop Desktop computers are more likely to need peripheral devices. The peripheral devices would be used to manage specific input and output processes (like printing) when necessary. Another way to look at peripheral devices is that they are dependent on the computer system. For example, most printers can't do much on their own, and they only become functional when connected to a computer system. Laptops and or tablets can have peripheral devices, but peripheral devices would end up weighing them down and making them less mobile. A smartphone is rarely used in situations where you would need a peripheral device. Servers do not usually have peripheral devices on them. Lesson 1: Common Computing Devices

What data protection technology could you implement in order to restrict the type of activity that a user could employ on digital products that they have purchased or rented? A. Trademark B. Patent C. Digital Rights Management D. Copyright

C. Digital Rights Management Digital rights management (DRM) is a set of access control technologies for restricting the use of proprietary hardware and copyrighted works. "Pay-per-use" policies were meant to prevent intellectual property from being copied freely, just as physical locks are needed to prevent personal property from being stolen. Lesson 6: Using Data Types and Lessons

Mice and keyboards CANNOT connect to which types of ports? A. Bluetooth interfaces B. PS/2 ports C. Ethernet ports D. USB ports

C. Ethernet ports Mice and keyboards can connect to a computer using various ports; however, an ethernet port is used to connect a computer with network services using a network interface card. Older mice and keyboards connect using PS/2 ports which had a round connector with pins. PS/2 ports were color coordinated using purple for keyboards and green for mice. Bluetooth is a protocol used by some mice and keyboards to connect wirelessly. Bluetooth devices require a receiver which is sometimes built-in or a separate USB dongle. Most current, modern wired mice and keyboards connect using USB ports. Lesson 11: Using Device Interfaces

What is an interpreted language? A. Interpreted languages represents machine code in human-readable text and is typically specific to a particular hardware architecture. B. Interpreted languages do not need to be compiled and are designed to retrieve specific records from a data set. C. Interpreted languages do not need to be compiled because the code gets converted to machine code at runtime. D. Interpreted languages organize data through structured nested tags and is rendered by a web browser.

C. Interpreted languages do not need to be compiled because the code gets converted to machine code at runtime. Interpreted languages do not need to be compiled. They convert the code to machine code during runtime. Python, Perl, and JavaScript are all popular forms of interpreted programming languages. Lesson 8: Programming and App Development

You are setting up a new computer, but it doesn't seem to be working. Should you check anything or contact the manufacturer? A. It's broken. Unplug everything and send it back. B. It's a brand-new computer, you don't need to check anything. C. It would be best to double-check you have connected the cables correctly. D. Just contact the manufacturer and get their technical opinion.

C. It would be best to double-check you have connected the cables correctly. Before you contact the manufacturer to report a problem, go back and make sure that you have everything connected properly, especially the power cable. Contacting the manufacturer to report a problem without confirming whether or not everything is set up properly will make you look unprepared and unprofessional. Lesson 5: Troubleshooting and Support

Give two examples of semi-structured data stores. A. Relational databases and text files B. Key/value pair database and PowerPoint presentations C. Key/value pair databases and markup language document stores. D. Word documents and PowerPoint presentations

C. Key/value pair databases and markup language document stores. Semi-structured data lacks the structure of a formal database architecture but adds associated metadata to raw unstructured data. This helps identify the data. Two examples of semi-structured data are key/value pair databases and markup language documentation stores. A key/value pair database is semi-structure; however, PowerPoint presentations are considered unstructured data. A relational database is considered structured data and a text file is considered unstructured data. Both Word documents and PowerPoint presentations are considered unstructured data. Semi-structured data uses metadata to help identify the contents of the data. Lesson 9: Using Databases

You want to purchase a computer with a fast graphics interface. What type of expansion slot should you look for? A. Motherboard SIMM slots—this type of slot has 30-pin slots typically used in laptops while the 64-pin and 72-pin slots were found on desktop motherboards. B. SDRAM and DDR—this type of slot is common for desktop computers (if you use a laptop, you need to look for a SODIMM) each having various types and speeds. C. PCIe x16—this is a type of PCI Express slot that uses 16 'lanes'. Each lane can transfer 250 MBps (or 500 MBps for PCIe 2 and 1 GBps for v3). D. Connect solid-state graphics to the high-speed SATA slots and mechanical disk drives to the lower-speed slots.

C. PCIe x16—this is a type of PCI Express slot that uses 16 'lanes'. Each lane can transfer 250 MBps (or 500 MBps for PCIe 2 and 1 GBps for v3). PCI Express (Peripheral Component Interconnect Express), officially abbreviated as PCIe or PCI-e, is a high-speed serial computer expansion bus standard, designed to replace the older PCI, PCI-X, and AGP bus standards. SDRAM and DDR slots are the expansion slots on the motherboard where you would put more memory. SDRAM and DDR are for a desktop, and SODIMM is for motherboards. SIMM are the older legacy type memory cards from the '90s. Highspeed SATA slots are part of the computer bus interface that connects host bus adapters to mass storage devices, such as hard disk drives, optical drives, and solid-state drives Lesson 10: System Components

Why might you use the Services snap-in to manage background processes rather than Task Manager? A. The Task Manager allows you to modify which user or system account the service runs as but the Services snap-in has restart functionality. B. The Service snap-in tool allows you to start and stop services, but the Task Manager will also allow you to configure service properties. C. Task Manager allows you to start and stop services but the Services snap-in also allows you to configure service properties. D. The Task Manager requires administrative privileges to run but the Services snap-in can be run by any user.

C. Task Manager allows you to start and stop services but the Services snap-in also allows you to configure service properties. The Microsoft Management Console (MMC) provides a framework for building management consoles. The Service snap-in allows you to configure service properties as well as start and stop services. The Task Manager allows only the starting, stopping, or restarting of services. Lesson 4: Managing an OS

What two things are configured on a disk to make storage space on the disk available to the Windows OS? A. The disk must have a recovery file and configure the backup settings to point to that file. B. The disk must have 6 GB of RAM configured and the system should automatically allocate a matching pagefile. C. The disk must contain at least one partition, typically allocated a drive letter, and the partition must be formatted with a suitable file system. D. The GUID Partition Table (GPT) needs to be configured and then you must populate the volumes.

C. The disk must contain at least one partition, typically allocated a drive letter, and the partition must be formatted with a suitable file system. A disk must have at least one partition for the OS to use it. Also, each partition must be formatted with a file system so that the OS can read and write files to the drive. Lesson 4: Managing an OS

What computer component is most restrictive in terms of determining upgrade potential for a desktop computer? A. System firmware B. The Network Interface Card (NIC) C. The motherboard D. The Graphics Processing Unit (GPU)

C. The motherboard The motherboard is a Printed Circuit Board (PCB) with some built-in processors (the chipset), sockets for upgradable components (CPU, RAM, adapter cards, disk drives), and wires (buses) to connect them together. You could upgrade the motherboard itself, but this is rarely cost-effective. The Network Interface Card (NIC) provides the connection that computers, smartphones, and tablets use to connect to a computer network. It allows them to share information locally and to access data over the Internet. Firmware is the "low-level" operating system that runs the bootstrapping process which occurs before the operating system software is loaded and enabled. It can be upgraded with new firmware. The Graphics Processing Unit (GPU) may actually be an integral part of the motherboard, but it is often installed as a separate device specifically designed to run graphics. Lesson 10: System Components

Which of these statements is NOT true about Universal Serial Bus (USB) cables? A. There are USB cables with normal size connectors on one end and mini or micro device connectors on the other. B. The connectors for the host (PC) and device use different form factors. C. USB cables never have the same connectors at either end. D. There are now USB cables with reversible Type C connectors.

C. USB cables never have the same connectors at either end. While not commonly used, it is possible to have a USB cable with identical ends. USB cables come in multiple different form factors to enable various components to attach to a computer for input and output purposes. There are USB connectors to fit mini and micro devices on one end and standard USB connection on the other. Now there are reversible Type C connectors that make plugging devices in easier. Reversible Type C connectors can be plugged in either way, and the user does not need to worry about which side of the USB plug faces upwards. Lesson 11: Using Device Interfaces

You are looking for content on a topic, but your search is returning millions of matches that are not particularly helpful. Which option includes two methods that you could use to get better search results? A. Search using a broader criterion (don't be as specific), or use an asterisk (*) in place of a character in your search term. B. Use a different search engine, or start your search over and come back to it later. C. Use more search keywords (ideally with 'uncommon' words), or search for an exact phrase by enclosing it in quotes. D. Verify your spelling using a spellchecker, or use a question mark in place of a character in your search term.

C. Use more search keywords (ideally with 'uncommon' words), or search for an exact phrase by enclosing it in quotes. If an Internet search returns too many matches, you may need to narrow your search so that you get more accurate results. Use more search keywords (ideally with 'uncommon' words), or search for an exact phrase by enclosing it in quotes. Lesson 5: Troubleshooting and Support

What is the main advantage of using a CPU in 64-bit mode? A. It's new and technically more scalable than the 32-bit CPU. B. CPUs don't use 64-bit mode; they are limited to 16 bits. This means that each instruction is 16-bits "wide". C. There are no advantages of a 64-bit CPU over a 32-bit CPU. They cost more money and are not worth the cost. D. 64-bit software is more reliable and a bit faster than 32-bit software. It also supports more system memory.

D. 64-bit software is more reliable and a bit faster than 32-bit software. It also supports more system memory. The main advantage of 64-bit processors is the ability to use more system memory. 32-bit systems are limited to addressing up to 4 GB, whereas 64-bit systems can address up to 256 TB (or more). A 64-bit CPU can run a 64-bit or 32-bit OS. A 32-bit CPU cannot run 64-bit software. x86 is a legacy CPU processor that was created in 1978 and designed for 16-bit CPUs. This means that each instruction is 16-bits "wide". There are clear advantages of 64-bit processors over 32-bit processors, starting with double the processing speed, which is definitely worth the extra cost. Scalability is defined as the capability of a system, network, or process to handle a growing amount of work. Although the 64-bit can increase system memory, it is about equal in scalability as the 32-bit processor. Lesson 10: System Components

In general, what is the difference between the char and string data types? A. There is a limit on the amount of storage that can be used by a string. There is no limit for a character. B. Char is variable length field for storing a sequence of characters. A string stores a single textual character or string in a fixed length field (typically 1 byte). C. A string cannot be used for mathematical operations. When a number is entered as a character data type, you can perform mathematical operations on it. D. Char stores a single textual character in a fixed length field (typically 1 byte). A string is a variable length field for storing a sequence of characters.

D. Char stores a single textual character in a fixed length field (typically 1 byte). A string is a variable length field for storing a sequence of characters. Lesson 6: Using Data Types and Lessons

You are advising a colleague about best practices when troubleshooting. You have identified the following techniques to use to identify a problem: gather information, duplicate the problem, question users, identify symptoms, and approach multiple problems individually. If you are following CompTIA's troubleshooting model, what other piece of advice should you give? A. Test the theory to determine a cause B. Research the knowledge base or Internet C. Establish a theory of probable cause D. Determine if anything has changed

D. Determine if anything has changed The first step of the CompTIA troubleshooting model is to identify the problem. This involves the following techniques: gather information, duplicate the problem, question users, identify symptoms, determine if anything has changed, and approach multiple problems individually. The technique missing from the scenario is to determine if anything has changed. Lesson 5: Troubleshooting and Support

Which Windows interface is used for advanced management and troubleshooting of devices? A. Display tab B. Web configuration C. Personalization applet D. Device manager

D. Device manager Device Manager is used to update drivers and obtain more advanced troubleshooting information. The basic user interface is either Devices and Printers or the device pages in the Settings app, depending on the Windows version. Lesson 12: Using Peripheral Devices

What are the structural elements of a database? A. Each table stores information about queries and reports. B. Each query stores information about tables in reports. C. Each report stores information about tables in fields. D. Each table stores information about records in fields.

D. Each table stores information about records in fields. A database is an organized collection of information that consist of tables of information, organized into columns and rows. Each row represents a separate record while each column represents a single field within a record. Lesson 9: Using Databases

You have asked a senior manager to authorize your plan of action for resolving a fault in a software application. What name is given to the process you are following? A. Verifying full system functionality B. Testing the theory C. Considering multiple approaches D. Escalating the problem.

D. Escalating the problem Escalating a problem is when you reach out to an experienced staff member for assistance and approval of your procedure or actions. When you can no longer work autonomously and have to ask for help, then you are escalating. Lesson 5: Troubleshooting and Support

How does Microsoft SQL Server differ from Microsoft Excel when used to store a dataset? A. Excel is an example of relational database software that is better suited for larger volumes of information and more users, whereas SQL Server is a flat file system. B. Excel is an example of relational database software, whereas SQL Server is a flat file system that is better suited for larger volumes of information and more users. C. Excel is an example of a flat file system that is better suited for larger volumes of information and more users, whereas SQL Server is relational database software. D. Excel is an example of a flat file system, whereas SQL Server is relational database software that is better suited for larger volumes of information and more users.

D. Excel is an example of a flat file system, whereas SQL Server is relational database software that is better suited for larger volumes of information and more users. Microsoft Excel is an example of a flat file system. These do not scale well, and usually support a single user only. Relational Database Management System (RDBMS) platforms enable many hundreds or thousands of users to connect concurrently, and can support very large datasets. Also, an RDBMS can enforce data types for each column and validate information entered as fields and records. SQL Server is an example of a RDBMS, and Excel is an example of a flat file system. Excel is a flat file system, not an RDBMS. SQL Server is the RDBMS that is better suited for larger volumes of information and more users. Flat file systems are not suited for larger volumes of information and more users. Flat file systems are better with smaller datasets and singles users. Lesson 9: Using Databases

What is an example of open source operating systems? A. BIOS and UEFI firmware B. Windows and MacOS C. Embedded operating systems D. Linux, Chromium, or Android

D. Linux, Chromium, or Android Linux, Chromium, or Android are examples of open source operating systems. Generally, open source refers to a computer program in which the source code is available to the general public for use and/or modification from its original design. Open source code is typically a collaborative effort where programmers improve upon the source code and share the changes within the community so that other members can help improve it further. Lesson 3: Using an OS

What is the difference between freeware and open source software? A. Open source applications are those that may be downloaded from the Internet and used without restriction. B. Open source means that the software is intended for purchase to meet commercial needs. C. Open source is provided on a trial basis and users commonly have to purchase the full version after the trial period has passed. D. Open source means that the programming code used to design the software is publicly available.

D. Open source means that the programming code used to design the software is publicly available. Open source licensing ensures that free and legal redistribution of the software is possible. You have the ability to access the code and have the right to modify it. Lesson 7: Using Apps

You have to open a file located on a network server. What should be your first step? A. Open the search dialog box and type the name of the file you are looking for. B. Open the This PC object from Explorer and locate the server hosting the file. C. Open the Quick Access object from Explorer and locate the server hosting the file. D. Open the Network object from Explorer and locate the server hosting the file.

D. Open the Network object from Explorer and locate the server hosting the file. Your first step to open a file located on a network server is to open the Network object from Explorer and locate the server (computer) the file is hosted on. If you open the This PC object from Explorer, you will find files that are stored on your computer. Opening the Quick Access object from Explorer will show the various folders and libraries that have been marked as needing quick access. This will not show network server files unless they have been mapped to your PC and marked as quick access. The search dialog box can help locate files on the local PC, but it will not search network file storage. Lesson 3: Using an OS

You have to open a file located on a network server. What should be your first step? A. Open the search dialog box and type the name of the file you are looking for. B. Open the This PC object from Explorer and locate the server hosting the file. C. Open the Quick Access object from Explorer and locate the server hosting the file. D. Open the Network object from Explorer and locate the server hosting the file.

D. Open the Network object from Explorer and locate the server hosting the file. Your first step to open a file located on a network server is to open the Network object from Explorer and locate the server (computer) the file is hosted on. Lesson 3: Using an OS

Which of the following is NOT an example of unstructured data? A. PowerPoint presentation B. Image files C. Text files D. Relational databases

D. Relational databases Unstructured data provides no rigid formatting of the data. Unstructured data is typically much easier to create than structured data. There are many examples of unstructured data; however, relational database is not unstructured. A relational database is considered structured data. Structured data enables easier access to the stored information and increased flexibility over retrieving exactly what you are looking for. Image files do not provide rigid formatting and are therefore considered unstructured data. Text files do not provide rigid formatting and are therefore considered unstructured data. PowerPoint presentations do not provide rigid formatting and are therefore considered unstructured data. Lesson 9: Using Databases

What is the registry and how does it distinguish Windows and Linux? A. The registry sets tasks to run at a particular time. Linux uses the cron utility to run tasks at a particular time. B. The registry is a utility that allows the user to shut down processes. Linux uses a command-line tool to kill a process. C. The registry is a snap-in to check which services are running and to start and stop each service. Linux does not use snap-ins. D. The registry is a database of configuration settings supporting the Windows OS. Linux uses individual text files to store settings.

D. The registry is a database of configuration settings supporting the Windows OS. Linux uses individual text files to store settings. The registry is a database of configuration settings supporting the Windows Operating System. The Registry Editor (regedit) is a means of directly editing this database. In contrast, Linux uses individual text files to store settings. Lesson 3: Using an OS

Following installation of a program written for an older version of Windows, you receive an alert that it might not have installed correctly. What feature could you use to make the program run correctly? A. Use the Repair option inherent in most programs to automatically fix this issue. B. The program's Details tab to use settings for the latest version with the latest patches. C. Use the uninstall/reinstall feature that should fix any compatibility issues you may have. D. Use the program's Compatibility tab to use settings for the older Windows version.

D. Use the program's Compatibility tab to use settings for the older Windows version. After an application has been installed, you may experience difficulties getting it to run. The Compatibility tab can be used to run the program in a compatibility mode for legacy applications (like Windows 98 for instance). Lesson 7: Using Apps

Your computer locks up (freezes) periodically and feels hot to the touch. Could these things be related? A. No, two different problems likely exist that need troubleshooting. B. Yes, overheating often occurs when the computer is locked up. C. No, temperature of your computer does not affect computer operation. D. Yes, many lockup problems are caused by overheating.

D. Yes, many lockup problems are caused by overheating. At high temperature, many operating systems automatically shut down your system to prevent damage. The blue screen and frequent memory errors are symptoms of an overheating desktop or laptop. A first sign to look out for is constant or frequent fan operation. Cleaning the exhaust fan vents of dust may resolve this issue. Lesson 5: Troubleshooting and Support

What should you do before attempting to set up a new computer system? Verify that the environment is suitable and that the installation will be safe. Verify that the computer is concealed within a desk compartment and out of sight. Verify that the computer cables are loose and free of any bindings. Verify that the placement maximizes space even if the keyboard is in an awkward place.

Verify that the environment is suitable and that the installation will be safe. Before setting up a new computer, you should verify that the environment is suitable and that the installation will not cause electrical or trip hazards. Additionally, the installation needs to be healthy to use with sufficient ergonomic considerations. Placing a computer inside a desk compartment may expose the hardware to excessive heat and is not considered a suitable environment. Loose cables that are free of any bindings may create a trip hazard for the user and passers-by. Awkward placement of the keyboard or mouse can result in improper use and is associated with a number of health risks. Lesson 2: Using a Workstation

Your colleague has to run many applications at the same time and finds it difficult to know which icon to choose when switching between them. What alternative method could you suggest? a. Place all the application shortcuts within a favorites folder for quick access. b. Press Alt+Tab - this shows previews of the window and allows the user to quickly switch between windows. c. Upload documents to the cloud and use a cloud interface to switch between them. d. Press "CTL-ALT-DEL" - task manager will show him a list of all the active programs.

b. Press Alt+Tab - this shows previews of the window and allows the user to quickly switch between windows. Pressing Alt+Tab will show previews of the window and allow a user to quickly switch between them. Windows can also show previews of the window contents when pointing at the taskbar icon. Placing all of the application shortcuts within a favorite folder may help the colleague launch new instances of the application, but it will not help when switching between them. While cloud computing is becoming popular, this will not help the colleague switch between applications on a local computer. The task manager will show him what is active, but it doesn't allow him to switch between applications. Lesson 2: Using a Workstation

You have to sign in to Windows - does it matter if the CAPS LOCK light on the keyboard is activated? a. Windows usernames and passwords are converted to upper case, so the CAPS LOCK does not affect login. b. Windows usernames are not case sensitive, so the CAPS LOCK does not affect login. c. Windows passwords are case sensitive, so the CAPS LOCK may prevent successful login. d. Windows passwords are not case sensitive, so the CAPS LOCK key is ignored during login.

c. Windows passwords are case sensitive, so the CAPS LOCK may prevent successful login. Windows passwords are case sensitive, therefore, having the CAPS LOCK enabled on the keyboard does matter. The CAPS LOCK key has the same effect as holding the SHIFT key down while typing the password. This results in all upper-case letters. Windows does not convert username and passwords to upper case. Having the CAPS LOCK enabled will cause login problems unless the password is in upper case. While it is true that the username is not case-sensitive, the password is, so the CAPS LOCK may prevent successful login. The CAPS LOCK key is not ignored during login. Windows will also notify the user during login if the CAPS LOCK is activated.. Lesson 2: Using a Workstation

When setting up a desktop computer, what factor should you consider when deciding on the location of the system case? a. You need to find a dry and warm place where a cover can protect the unit from dust. b. You need to find the best location on the floor so that the system unit has accessible drives and USB ports. c. You need to check the proximity of the refrigerator to ensure that it is close enough. d. You need to consider the position of power outlet(s) and peripheral devices as well as air flow around the system unit.

d. You need to consider the position of power outlet(s) and peripheral devices as well as air flow around the system unit. When setting up a workstation, it is important to keep wires away from walkways. Therefore, consider the location of power outlets and network connections It is imperative that the system unit be kept off the ground. Dirt and other particles will cause issues. Plus, it would not be good to mop around. The proximity of the refrigerator in relation to your computer may increase convenience but is not a true consideration for placement of the system unit. Finding a dry and cool location is ideal to prevent overheating. Preventing dust from entering the unit is important; however, covering the unit retains heat. Lesson 2: Using a Workstation

What is the difference between a procedure and a function? A. A procedure does something while a function does something and then returns a value to the main program. B. A function does something while a procedure does something and then returns a value to the main program. C. A procedure is a container that can grow or shrink in size during program execution as elements are added or removed while a function cannot be resized. D. A function is a container that can grow or shrink in size during program execution as elements are added or removed while a procedure cannot be resized.

A. A procedure does something while a function does something and then returns a value to the main program. The key difference between a procedure and a function is that the latter can return a value to whatever program or process called it. A procedure just "does something" without returning a value to the main program. Lesson 8: Programming and App Development

If you do not have a support contract, what is likely to be the best option for obtaining advice about a problem with an application? A. A product support or community forum B. Download a free application fix-it tool off the Internet C. Delete and reload the application D. Obtain a copy of the application from a third-party vendor

A. A product support or community forum Locate the developer or manufacturer's official support forums. You may find there's a particular fix available or advice from other users. For smaller freeware programs, you may even find posts from the developer. Lesson 5: Troubleshooting and Support

What do you need to know to connect to a device that is configured over the network? A. Typically, the Internet Protocol (IP) address of its management page or the device's hostname B. Typically, the Media Access Control (MAC) address of the device you want to connect to C. Typically, the physical location of the computer D. Typically, the port in the wall where the network cable is plugged into

A. Typically, the Internet Protocol (IP) address of its management page or the device's hostname There are a couple of ways to find a network device if it is configured to be shared across the network and you wish to access it. You can either get to it via the IP address which is assigned to it by your administrator or the hostname. You are also likely to be prompted for a user name and password. Lesson 12: Using Peripheral Devices

Windows comes with web server software, but it is not installed by default. How would you install this software? A. Use the Turn Windows features on or off dialog from Programs and Features. B. Use App Installer feature in Programs and Features tab to uninstall and then reinstall the web server software. C. Use the Repair option inherent in Programs and Features to automatically run the web server feature. D. Use the Server Software tab in Programs and Features to install the web server.

A. Use the Turn Windows features on or off dialog from Programs and Features. Windows comes with a number of components and add-ons that may be enabled or disabled by default. You can control these by clicking the Turn Windows features on or off link in Programs and Features. Lesson 7: Using Apps

You want to purchase a flat panel monitor that can show widescreen movies. Which native resolution should you choose? A. 1024x768 B. 1920x1080 C. 1920x1440 D. 1400x1050

B. 1920x1080 Widescreen images are produced with a variety of aspect ratios and used in film, television and computer screens. Of the options provided, 1920x1080 is the only widescreen resolution with an aspect ratio of 16:9. A monitor with a native resolution of 1024x768 would display with a 4:3 aspect ratio which is not widescreen. A monitor with a native resolution of 1920x1440 would display with a 4:3 aspect ratio which is not widescreen. A monitor with a native resolution of 1400x1050 would display with a 4:3 aspect ratio which is not widescreen. Lesson 11: Using Device Interfaces

What type of file in an OS is the main means of providing coordination of hardware components? A. A directory file B. A device driver C. An executable file D. A user file

B. A device driver Coordination for hardware and peripheral components in the OS are provided through device driver files. A device driver is typically written by the manufacturer for specific hardware. Some devices utilize generic driver files created by the operating system vendor. Lesson 3: Using an OS

What is the decimal number 75 in binary and hexadecimal? A. 5C in binary and 0101 1100 in hex B. 4B in binary and 0100 1011 in hex C. 0100 1011 in binary and 4B in hex D. 0101 1100 in binary and 5C in hex

C. 0100 1011 in binary and 4B in hex Hex notation is often indicated using 0x to precede the hex digits, so you may see this written like 0x4b. To work out the answer without a calculator, write out the place values for each notation system. For binary you'd have columns for 64, 32, 16, 8, 4, 2, and 1 and put a 1 in each column you need to add up to 75 and a 0 in the others. For hex you only need 16 and 1 (75 divided by 16 is 4 remainder 11, which is represented as "B" in hex) Lesson 6: Using Data Types and Lessons

What is a Command Line Interface (CLI)? A. The Command Line Interface allows the user to schedule tasks to run at a particular time. B. The Command Line Interface allows the user to format mass storage devices using a GUI. C. A Command Line Interface allows the user to interact with the OS using typed commands or scripts rather than a GUI. D. The Command Line Interface prevents access to administrative functions without administrative privileges.

C. A Command Line Interface allows the user to interact with the OS using typed commands or scripts rather than a GUI. The CLI is the Command Line Interface and it allows users to interface with the operating system without using a Graphical User Interface (GUI). It is not recommended for use by a standard user. Lesson 4: Managing an OS

Which data representation format can encode the widest range of characters? A. Binary B. ASCII C. Unicode D. Hex

C. Unicode Unicode is the standard maintained by the Unicode Consortium, and as of June 2018 the most recent version is Unicode 11.0. It can encode the widest range of characters. Lesson 6: Using Data Types and Lessons

What type of component provides a passive cooling solution? A. An insulation blanket B. A cooling fan C. A liquid cooling system D. A heatsink

D. A heatsink A heatsink is the type of component that passively cools a computer. Passive cooling is an approach to cooling computer components by convection with no power required. Cooling fans are a form of active cooling, designed to draw cool air from vents in the front of the case over the motherboard and expel warmed air from the back of the case. A liquid cooling system uses liquid to transfer heat out of the system's case. A liquid cooling system is an active system. Insulation blankets would trap heat generated by computing device inside the computer case, most likely resulting in overheating. Lesson 10: System Components

You want to find something on a particular website, but the site does not have a search tool. Could you use a general search engine (and if so, how)? A. Yes—just type the website name first in the search engine, and then the keywords in quotations. B. No—you just need to keep searching the website until you find what you're looking for. C. No—it is not necessary to use a general search engine. Just type CTRL-F and type the word you are looking for. D. Yes—you use an advanced search form or the "site:" operator like "CertMaster site:comptia.org."

D. Yes—you use an advanced search form or the "site:" operator like "CertMaster site:comptia.org." Using the advanced search form, or using the "site:" operator, are the best options for finding things on a particular website that doesn't have a search tool. Open a search engine of your choice and type in whatever you were looking for, followed by "site:" and the domain name of the website you're searching. Lesson 5: Troubleshooting and Support

What type(s) of IoT appliance are less likely to be controlled via a home automation hub? Environmental control systems are unlikely to interface via a hub. Smart refrigerators are unlikely to interface via a hub. Physical shades and window curtains are unlikely to interface via a hub. Modern cars and medical devices are unlikely to interface via a hub.

Modern cars and medical devices are unlikely to interface via a hub. Home automation hubs link to kitchen and domestic appliances, streaming media players, and potentially security systems. Modern cars and medical devices are unlikely to interface via a hub simply due to their portability. Some of the newer smart refrigerators are specifically marketed to be used with a home automation hub. You may be surprised with all of the household items that can connect to a hub. There is a market for window shades and curtains to be connected to a hub to control lighting in a house. These devices typically connect to an automation hub. There are now many Environmental Control Units (thermostats, heaters, air conditioners) that are controlled via a home automation hub. Lesson 1: Common Computing Devices

What factors should you consider when positioning input and output devices? a. Ensure that there is proper lighting on your desk to illuminate the screen. b. Ensure that there is enough room on your desk to stack them on top of each other. c. Ensure that the monitor is located at the edge of the desk to maximize work area. d. Ensure that they can be used without exerting strain, especially on the arms / wrists and back / neck.

d. Ensure that they can be used without exerting strain, especially on the arms / wrists and back / neck. You should consider how you position input and output devices to ensure that they are ergonomically safe for you to use. That means that they don't cause strain to your body. You should also avoid trip hazards. Stacking all of your input and output devices may cause damage to the hardware and would make them difficult to use. Having sufficient workspace on the desk is important; however, placement of the monitor must be secure so that it cannot fall off the desk. Shining light on the screen will make it more difficult to see by creating glare. Lesson 2: Using a Workstation

What function of an operating system is performed by the "shell"? A. Interface between a host computer and a guest operating system. B. Interface between the applications and the hardware. C. Interface between the hardware and the firmware. D. Interface between the user and the computer.

d. Interface between the user and the computer. The "shell" provides an interface between the user and the computer. Early operating systems for PCs utilized command-line interfaces or simple menu systems. Modern computers utilize a Graphical User Interface (GUI) and a command-line interface. Lesson 3: Using an OS

Which notation system supports presenting the largest numbers using the fewest digits? A. Hexadecimal B. Decimal C. Binary D. KiloByte

A. Hexadecimal The notational system that supports presenting the largest numbers using the fewest digits is hexadecimal. With hexadecimal notation, each digit can store 16 bits of information. Because of this efficiency, hex is ideal for handling large values. Hexadecimal is also referred to as base 16. Lesson 6: Using Data Types and Lessons

What term is used to describe selecting and viewing information in a database? A. Report B. Query C. Storage D. Create

B. Query A query allows the user to specify criteria to match values in one or more fields and choose which fields to display in the results so that only information of interest is selected. Lesson 9: Using Databases

What type of programming concept allows for a variable size container? A. A procedure B. An array C. A vector D. A function

C. A vector The programming concept that allows for a variable size container is a vector. Vectors can grow or shrink in size as elements are added or removed. Lesson 8: Programming and App Development

What type of component provides persistent storage? A. The Random Access Memory (RAM) B. The Central Processing Unit (CPU) C. The Hard Disk Drive (HDD) and Solid State Drive (SSD) D. The Graphics Processing Unit (GPU)

C. The Hard Disk Drive (HDD) and Solid State Drive (SSD) Persistent data is that data that is stored permanently on the drive. A Solid State Drive (SSD) or Hard Disk Drive (HDD) provide persistent storage because this component uses technology to write data to disks or flash memory which do not require a constant flow of electricity. The Central Processing Unit (CPU) is responsible for executing actions on data, not storing data. Random Access Memory (RAM) is system memory. This type of memory is volatile, meaning that it is only preserved while the system is powered up. The Graphics Processing Unit (GPU) is not a storage device. The GPU controls the display functions and can often be a dedicated processor. Lesson 10: System Components

What type of software would you use to configure a server by connecting to it over the network? A. System restore B. Wireless input device C. Collaboration software D. Remote desktop

D. Remote desktop Remote Desktop allows a user to assume control of a computer from a different location by using an Internet connection. Remote Desktop part of Windows but other third-party applications provide similar functionality. Lesson 7: Using Apps

What provides sound functionality in a personal computer? A. Sound functions in modern PCs will send your audio directly to an external radio for processing. B. Sound functions must be provided by a plug-in sound card. C. Sound functions are provided by a plug-in card with external speakers. D. Sound functions are often provided by the motherboard chipset.

D. Sound functions are often provided by the motherboard chipset. Sound functions are often provided by the motherboard chipset. Most PCs come equipped with the needed hardware to process audio and do not require an additional soundcard; however, more advanced cards are available for audiophiles. It is possible to have a separate audio plug-in card that will provide separate audio functions but it is not always the case. The sound function in a PC is performed by the sound card (plug-in or integrated into the motherboard). External speakers are needed to produce the actual sound waves, but the processing does not require speakers. Sound processing still occurs within the PC hardware; however, additional functionality exists to send audio to third-party devices. Lesson 10: System Components

What crucial piece of information would you need when trying to locate support information about a computer system on the manufacturer's website? A. The type of keyboard and mouse you are using. B. The cost and date of purchase. C. The voltage on the power supply. D. The model number or a service code.

D. The model number or a service code. Manufacturers will reference model number or a service code for service support. The model number or service code will assist you in finding information specific to the computer system that you are working on. Lesson 5: Troubleshooting and Support

What type of computing device(s) is macOS designed for installation on? A. Servers and network storage B. Smartphones and tablets C. Feature phones D. Workstations and laptops

D. Workstations and laptops MacOS is designed for installation on workstations and laptops. MacOS is the operating system developed by Apple and used on all Apple workstation and laptop products. Lesson 3: Using an OS

Your colleague is using a laptop and you notice that he laboriously clicks the external mouse repeatedly to scroll through the document you are co-editing. Which feature could he use to be more productive? a. The zoom function to zoom out so that each click scrolls through more pages b. The Ctrl + Arrow Keys to move through a document word by word instead of letter by letter c. The trackpad on the laptop since it is designed for easy scrolling d. The mouse scroll-wheel on the external mouse to maneuver the scroll bar

The mouse scroll-wheel on the external mouse to maneuver the scroll bar. The mouse scroll wheel and the scroll button on the scroll bar makes browsing through many pages easier than repeatedly clicking the mouse. Your colleague might not know these capabilities exist. Using the Ctrl + Arrow Keys will probably make scrolling less productive. The Ctrl key used with the Arrow Keys moves the mouse one word at a time. While the trackpad acts much like a mouse in that it controls the cursor on the screen, it can be cumbersome and you are limited to the physical size of the pad itself. The zoom function may help scroll faster; however, the text size would likely be too small, preventing your colleague from reading what is on the screen. Lesson 2: Using a Workstation

Why is a smartphone NOT a good tool for writing a report? They have great user interfaces that enable you to write quickly. Touchscreen or mini keyboards are not optimized for writing lots of text. They have large displays with excellent resolution. Their size makes them easy to place in ergonomic positions.

Touchscreen or mini keyboards are not optimized for writing lots of text. Smartphones do not make good tools for writing reports because their touchscreens or mini keyboards are not large enough to write large text files on, so they are not optimized for writing lots of text. Furthermore, there are some privacy concerns with Smartphones. If your phone is stolen then information will no longer be private. While smartphones do have pretty good user interfaces that can help you write quickly, they are still too small to be of any use as a word processing tool. Although smartphone sizes are increasing, their displays are still too small for effective word processing. Holding a smartphone for a lengthy period of time can be harmful from an ergonomic perspective. Very few people use smartphones in an ergonomically-safe method. Lesson 1: Common Computing Devices

You have to open a word processing application, but you cannot see an icon on the desktop. What should you do? a. Look for the shortcut in Start Menu or Start Screen. b. Right-click on the desktop, go to view, and change the icon size to large. c. Double click the Blue E or Orange Fox in your taskbar, and search for the icon on the internet. d. Look for the shortcut in the C: drive of the computer.

a. Look for the shortcut in Start Menu or Start Screen. Not all programs add shortcuts on the Desktop. If you want to open a word processing application when the icon isn't on the desktop, then the best place to look is for a shortcut in the Start Menu or Start Screen. Right-clicking on the desktop and going to view will help you change the icon sizes for the icons that are present, but it won't do anything for an icon that is not there. Double-clicking the Blue E or Orange Fox in your taskbar will bring up the web browser. It won't help you bring up a word-processing application. Looking for a shortcut on the C: drive may work but will take a long time. It is possible that a shortcut doesn't exist, so you may look and never find it. Lesson 2: Using a Workstation


Kaugnay na mga set ng pag-aaral

OBGYN- Chapter 17: The Uterus and Vagina

View Set

Skills - Assessment 2 (NCLEX Questions)

View Set

Chapter 22 Chapter Review - Endocrine and Nervous System

View Set

Chapter 17- Inflation, Unemployment & Federal Reserve Policy

View Set

CH. 12 & 13: Major & Trace Minerals

View Set

Biology- Unit 2- Book & lecture notes - Genetics -ch 7, MS2, ch 8, MS3

View Set

What's Out There: Exploring a Science Text in A Black Hole Is NOT a Hole

View Set