CompTIA TestOut Exam Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following would be the MOST LIKELY cause for a computer to perform sluggishly?

Hard drive

Which of the following certifications would you pursue to help you land a job as a network administrator?

Cisco CCNA

Social media marketers need the ability to do what?

Collaborate across teams

Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions?

Firmware

Which SQL command is used to give a user permission to a specific database object?

GRANT

Which of the following makes videos appear smoother and more fluid?

Higher frame rate

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?

IMAP

A programming paradigm is a method used to program a computer that guides the solving of a problem or performing of a task. Which of the following describes the procedural, or imperative, programming paradigm?

It uses a linear, top-down approach to solving problems.

Which of the following companies is a manufacturer of CPUs?

Intel

Which installation method is most likely to put your computer at risk of downloading a virus?

Internet installation

Abby needs a device that she can take to a client's location and show presentations from. Which of the following devices would be the BEST option for her?

Laptop

Which invention made it possible to have an entire computer on a single circuit board?

Microchip

Which of the following is an example of computer hardware?

Microchip

Which of the following is a top cause of motherboard failure?

Physical damage

Which of the following is a proper path name to a shared network printer?

\\computer_name\printer_name

How many years of prior experience in tech support do most MSP positions require?

2

Which command is used to add, change, or remove fields on an existing table?

ALTER TABLE

Which of the following are optical storage devices? (Select three.)

BD,CD,DVD

What do biometrics use to perform authentication of identity?

Biological attributes

Which of the following is cryptocurrency?

Bitcoin

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?

Change the router's default password

Which of the following rights is NOT guaranteed by copyright?

Right to avoid criticism

Which of the following careers requires advanced programming and analytical skills related to data mining and big data analytics?

Data scientist

Which of the following tech careers builds infrastructure for networking, telephones, radio, and other communication channels?

Internet service technician

Which of the following would be the BEST thing to do following an interview?

Send a thank you note

Which of the following is not a form of biometrics?

Smart card

Speaking in front of a mirror can help to improve which of the following traits?

Social skills

Martin's computer suddenly displayed a blue screen and then restarted. Which of the following BEST describes what happened?

System crash

A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?

JavaScript

Which of the following would a PC repair technician work on?

Laptop

Which application makes sure your computer has the most recent versions of its system software?

Windows Update

Which of the following components is NOT required to create a network?

Wireless adapter

Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?

import random

Which category of system software provides a platform for application software to run on?

Operating System

Which of the following should you do before going to an interview?

Research the company history and culture

Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations?

Statistical tools and formulas

A software developer wants to create an application that will work on Windows and Apple iOS operating systems. What can the developer do to make this task easier?

Use the APIs for each operating system.

A technician is tasked to configure a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available. Which of the following should the technician configure?

VPN

Which type of digital picture can be scaled to any size without losing quality?

Vector

Which of the following voltages from an ESD discharge would be the minimum to short a computer's hardware components?

100 volts

How many possible values would an 8-bit audio sample have?

256

Which cellular network type was the first kind of network to use encryption?

2G

How long should a good elevator pitch be?

30 seconds

Which of the following statements is true regarding a VPN?

A VPN masks a user's IP address in order to make their actions untraceable.

A person that can use HTML, CSS, and JavaScript to create websites (as well as service the website and manage user accounts) is known as which of the following?

A full-stack web developer

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office.

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network.Which of the following network devices would be the BEST choice for this connectivity?

Access point

Which hardware component processes data?

CPU

An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. Which of the following should the accountant use to send the email?

Cipher text

Which of the following stores data using microscopic light and dark spots?

Compact disc

A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect?

Data and information

Which of the following is not an advantage of SSDs over HDDs?

Inexpensive

You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs?

Hard disk

Which of the following can be used by a programmer to debug code?

Integrated development environment (IDE)

Which of the following personality traits means that you possess high moral character regardless of whether you're being watched by others?

Integrity

What type of file system is NTFS?

Journaling

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?

Local installation

Multiple computers configured to be able to communicate and share information with each other form a ____________.

Network

Which of the following commands makes an application shortcut appear on the taskbar?

Pin to taskbar

Where would you go to cancel a print job?

Print queue

Digital sound recordings capture sound waves and divide them into distinct segments. Each segment is assigned a value. What is that value called?

Sample height

Julie has 3 printers installed on her Windows 10 computer and wants to set one of them as the default printer. Where would she go to do this?

Settings > Devices > Printers & scanners

What are pixels that are the exact same between multiple frames called?

Temporal redundancy

When composing an email message, why might you want to use the Bcc field?

To copy the email confidentially

Which of the following is a type of input device?

Touchscreen

Which invention allowed computers to become smaller in size?

Transistors

Which of the following is used to identify specific hypertext resources on the World Wide Web?

Uniform Resource Locator

What is junk email?

Unwanted, unsolicited email

Disk cleaners, antivirus software, backup tools, and file compressors are which kind of system software?

Utility Software

You need to test a version of macOS but only have a Windows computer. What technology could you use?

Virtualization

Which of the following is something that an Information Technology (IT) professional would do?

Build and repair computers

Which of the following devices would be the BEST option for a gamer?

Desktop computer

On a flowchart, which of the following represents a decision?

Diamond

Which of the following features is supplied by WPA2 on a wireless network? (Select two.)

Encryption, Authentication

Which network type uses light pulses to transmit data?

Fiber optic

Which of the following would be the BEST answer to the question, "What is your greatest weakness"?

"I lack patience but this is something I'm working on."

Which of the following logic components is being used and how much is the interest if the amount is 5,000? (Select two.)IF amount < 5,000 THEN interest = 7%, ELSE interest = 8%.

Branching, 8%

Becca is working on a program that will store data. The program will need quick access to data and data persistence is not important. Where should the data be stored?

In memory

Which of the following Application Architecture Model tiers describes office productivity software?

One Tier

A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver?

Plain text

A user has entered a search string into an application and clicked on the search icon. Which of the following is the NEXT step in the computing process?

Processing

Which type of digital picture is made by storing individual pixel values?

Raster

Which permission option lets a user view files but not change them?

Read

Which of the following devices make use of a battery as its main power source? (Select two.)

Smartphone,Laptop

What is a web designer responsible for?

The look and feel of a website

Which of the following utilities would you use to find the path between two computers?

Tracert

Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?

802.11n

When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements?

Bar graph

What is the first step of the data analytics process?

Collecting raw data

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.Which of the following features lets you allow or reject client connections based on the hardware address?

MAC address filtering

Sarah turned on her computer and noticed that some important documents that were stored in her User folder are now missing. Which of the following would be the MOST LIKELY cause?

Malware infection

What is the main difference between a regular technical support specialist and a managed service provider technician?

Managed service provider's services are outsourced as a third party.

If your network does not have a DHCP server, what must you do to access the internet?

Manually change the TCP/IP properties to match your network's settings.

Where is the BEST place to obtain the latest printer driver?

Manufacturer's website

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter.Which of the following is the technology being used in these phones?

NFC chips

You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use?

Network & Internet

Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters?

Network Architect

Which of the following IT jobs includes installing and configuring network media?

Network administrator

The accounting department needs to be able to share files, such as spreadsheets, that can be accessed by everyone in the department. Which of the following would work BEST to provide a collaborative workspace?

Network share

Which of the following IT jobs typically do not require as much education or on-the-job experience?

Network technician

Making real and authentic connections with people is known as which of the following?

Networking

Which Creative Commons license type states that a work can be distributed as long as it is not changed?

No Derivative Works

Diana is using an image she found online in a poster that she is selling, even though the license states she is not allowed to make money off of it. Which license type would Diana MOST LIKELY be violating?

Non-Commercial

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?

Non-repudiation

Where are values the computer is directly working with at a particular moment in time stored?

On the CPU register

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality.What is the name of this model?

Open Source

Which of the following is used to force-close a program on an Apple computer?

Option, Command, Escape

Your company wants to use multifactor authentication. Which of the following would you most likely suggest?

PIN and smart card

A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server?

POP3

When working with an application such as Microsoft Excel to generate graphical reports, which of the following chart types would work BEST for data that has relative percentages of a whole?

Pie chart

Which of the following tools would you use to check connectivity between two computers?

Ping

Which of the following components converts AC to DC?

Power supply

Which of the following future IT trends will require many data analysts who can collect data, decide which data is relevant, and make good decisions based on that data?

Predictive healthcare

Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know how to write SQL commands and no forms have been created. Which of the following would be her BEST option to generate the report?

Query builder

Which of the following components stores values in short-term memory?

RAM

Which of the following is NOT a long-term storage device?

RAM

A typical computer monitor is which type of display?

RGB

Which medium does Wi-Fi use to send data between networks and devices?

Radio waves

Which of the following is the first step in verifying that a problem has been fixed?

Rebooting the system

Which of the following would you do as a computer forensics expert?

Recover digital evidence, some of which may have been damaged or deleted from storage devices.

Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis?

Reports

Which of the following is often the hardest part of troubleshooting?

Reproducing the problem

Which of the following Artificial Intelligence (AI) concepts includes self-driving cars?

Robotics

Which of the following access controls gives only backup administrators access to all servers on the network?

Role-based

Which service would be most useful when looking for information about your favorite TV show?

Search engine

You submitted the same paper from high school for a college class. Which form of plagiarism is this?

Self

Which of the following provides services to hosts on its network?

Server

Which Windows tool shows currently running programs and can be used to end a process?

Task Manager

What is the name of the narrow strip along the bottom of the Windows environment?

Taskbar

Which of the following schools allows students to receive dedicated training for a specific career?

Technical college

An information system is made up of which of the following general components?

Technology, people, and procedures

Wikipedia is considered which of the following sources?

Tertiary

Which of the following is the MOST important skill an internet service technician can possess?

The ability to quickly troubleshoot and fix any issues that may arise from customers

Which of the following commands is used to navigate to different folders in Command Prompt?

cd

Mary needs to rename her report.txt file to final_report.txt. Which command will allow her to do this?

ren report.txt final_report.txt

Which of the following describes the process of turning data points into useful information?

Data analytics

Which cellular network type was the first to have gigabit-per-second speeds?

4G

The ______________ is an information system that connects documents to each other by hypertext links.

World Wide Web

Which of the following is the best device to deploy to protect your private network from an untrusted public network?

Firewall

Which of the following would best prevent an unauthorized person from remotely accessing your computer?

Firewall

Which of the following uses persistent memory chips to store data?

Flash drive

Which of the following Internet technologies provides the FASTEST speeds?

Fiber optic

Which of the following utilities would you use to automatically assign IP addresses on a network?

DHCP

A _________ is a private network that utilizes the same technologies as the Internet.

Intranet

What is the term for software that anyone can use or modify for free?

Open-source Software

How many pages should a resume be for someone looking for their first job?

1

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?

5 GHz

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)

802.11a, 802.11g

Which of the following BEST describes a code of ethics?

A set of rules or standards you adopt that dictate how you act

Which kind of file would be hurt most by a lossy compression algorithm?

A text document

Which CPU type would MOST LIKELY be found in a smartphone?

ARM

Which of the following is most likely to have peer-reviewed material written by an expert in the field?

Academic journal

You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in?

Accidental

If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?

Accounting

Which of the following are characteristics of Bluetooth? (Select two.)

Ad hoc connections, 2.4 GHz radio wireless

Which of the following processes does 3D printing use?

Additive

Jessica, a programmer, has created specific statements, including conditional loops to accomplish a task. What has she created?

Algorithm

Which of the following features of an integrated development environment (IDE) BEST allow a programmer to code faster and with less effort? (Select two.)

An IDE has a library of built-in functions, An IDE can autocomplete key words.

You are working on a program that needs to keep track of many values at the same time. Which of the following would you use?

An array

Which component gets things running until the operating system takes over?

BIOS

Databases, authentication, and user accounts are all part of a website's ______________.

Backend

In which of the following careers does one usually work together in teams to create software programs?

Application developer

A software developer wants to add a custom Google Map to a customer's website. Which of the following would the developer use to accomplish this?

Application programming interface (API)

Bill wants to use an image he found online. The license says he can use it but must credit the original creator. Which Creative Commons license was used?

Attribution

The process of proving to the computer that you are who you say you are is called ____________.

Authentication

Dana has performed a transaction online. The transaction is recorded in a public database. Which future IT trend was MOST LIKELY used?

Blockchain technology

A user is shopping online and has added two items to the cart. When the user clicks the Checkout button, the shopping cart programming logic checks to see if the user is logged in already. If the user is logged in, the checkout process continues, otherwise, the user is prompted to sign in. Which of the following describes the logical component being used?

Branching

Which of the following should an electrical engineer be proficient in using?

CAD software

Mary is interested in moving into a career as a penetration manager. Which of the following IT certifications should she pursue?

CEH

Which of the following computer components typically has the FASTEST performance?

CPU

A computer has power, but there are no beeps and the computer does not boot. Which of the following would be the MOST LIKELY cause?

CPU failure

Which of the following key combinations lets you open Task Manager?

CTRL, ALT, DELETE

Which network type uses a coaxial cable to receive its signal?

Cable

Which of the following would be the BEST option to help you narrow down choices when identifying a career in IT?

Career Assessment Tests

You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections, and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted. Which of the following BEST describes the next step you should perform?

Check the vendor's website for an updated driver.

Which of the following is the most common type of resume?

Chronological

You have entered a URL into a browser and have received a 404 error. Which type of error did you receive?

Client error

Which of the following careers often requires that one works with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes?

Data analyst

Once you've identified a specific IT career you'd like to pursue, which of the following can BEST help you create a career plan? (Select two.)

Compare your current experience with job qualifications, Set clearly defined goals

The IT staff at a hospital shares genetic information about specific patients with a life insurance company. Which ethical standard was violated?

Confidentiality

Which of the following is a benefit of 3D printing over traditional manufacturing?

Consumes less material

Which of the following are the four general tasks a user needs to perform for a database to function properly?

Create, Read, Update, Delete

Why is it better to use a credit card than a debit card for online purchases?

Credit cards have better fraud protection

Which of the following is the MOST important skill for a PC technician?

Customer service

Which of the following is not an example of wireless networking communications?

DSL

Which of the following careers often requires expertise in mathematics and statistics to find relevant trends and patterns in data?

Data analyst

Forensics experts need to be thoroughly familiar with which of the following?

Data encryption methods, operating systems, and programming languages

Which of the following describes using data analytics to inform business operations?

Data-driven business decisions

Which of the following careers is responsible for backing up and securing an organization's databases?

Database administrator

Which of the following careers typically requires programming expertise in languages such as Java and Python, in addition to skills in optimizing database systems?

Database developer

Which process exports a database into a format that can be read by another program like a spreadsheet?

Database dump

Which of the following applications can be used for storing, modifying, extracting, and searching data?

Database software

Which of the following BEST describes a system administrator?

He or she is typically responsible for securing networks and responding to intrusions in smaller organizations.

Which of the following terms describes the process of rearranging files on the hard drive so that the computer runs more efficiently?

Defragmentation

Abby wants a high-end computer system for her home office that can be upgraded. Which of the following should she choose?

Desktop

What is the name of the large background area of the Windows environment that holds icons for files, folders, and applications?

Desktop

Tina has accepted a position as a graphic designer. She wants a powerful device that she can connect multiple large screens to. Which device would be the BEST option for her?

Desktop computer

Which of the following devices would be easiest to repair?

Desktop computer

As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is installed on most of the machines in your department. You have a copy of the latest driver on a USB flash drive. Which Windows utility will allow you to manually update this new driver?

Device Manager

Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer?

Device Manager

Which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Device drivers

Mary needs someone to make sure her podcast is high quality and sounds polished. Which of the following professionals should she hire?

Digital audio producer

Ted, an employee in the Sales department has asked a coworker, Ann, in the Production department to update the product descriptions contained in a Sales document. Ann can open the file but, after making changes, can't save the file. Which of the following digital security methods is MOST likely preventing this?

Directory permission

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed?

Document findings/lessons learned, actions, and outcomes

Which of the following is a good general rule to go by when deciding what to wear to an interview?

Dress one step above what the position requires.

The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step?

Duplicate the problem, if possible

Which of the following careers consists of designing tiny microchips?

Electrical engineer

Which of the following is NOT an example of an information system?

Electrical system

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email.Which of the following should be implemented?

Email filtering

What should a level 1 technician do when they are unable to solve an issue?

Escalate to a higher level of support.

While troubleshooting a problem with a computer, a technician has tested and confirmed a theory on how to fix the problem. Which of the following is the NEXT step the technician should perform?

Establish a plan of action to solve the problem and identify potential effects

Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology?

Establish a theory of probable cause

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Ethernet

Which type of Information System (IS) is used to help doctors diagnose diseases?

Expert systems

Which of the following keys is used to enter Safe Mode on a Windows computer?

F8

A short piece of copyrighted music is used in a news story covering the musical artist. Which DMCA provision would MOST LIKELY allow this?

Fair Use

Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?

Fair Use

Designations at the end of file names such as .docx and .html are called _____________.

File extensions

Which of the following security measures is a form of biometrics?

Fingerprint scanner

Which of the following is the BEST way to handle a program that is unresponsive?

Force-close the program

How many ping packets are sent by default in a successful ping request?

Four

In addition to good design sense, what else do web designers need to be proficient in?

Front-end coding languages

Using HTML and CSS to provide visual elements to the end user would be considered part of a website's _____________.

Frontend

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folder?

Full Control

The CEO of a small business travels extensively and is worried about having the information on their laptop stolen if the laptop is lost or stolen. Which of the following would BEST protect the data from being compromised if the laptop is lost or stolen?

Full disk encryption

The ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator would be MOST beneficial to which career?

Graphic designer

Which of the following professionals would be MOST likely to create a poster?

Graphic designer

Which of the following should be done before working on hardware in a computer system?

Ground yourself using an ESD wrist strap

Which Internet protocol is used to transmit encrypted data?

HTTPS

Which of the following has the ability to store user data even if the power to the computer is off?

Hard drive

Which of the following BEST describes personal responsibility?

How you act even if no one is watching

Mike decides to humiliate a former friend by posting embarrassing photos on social media. Which ethical standard did he violate?

Human dignity

Which of the following future trends in Information Technology (IT) refers to an organization automating as many tasks as possible?

Hyper-automation

This BEST describes Information Technology (IT)?

IT refers to everything tat involves computers.

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?

Improved performance

Which of the following would be the MINIMUM qualification for a PC technician job?

Industry certification

Which of the following lists the basic computing and processing steps in order?

Input, processing, output, and storage

A security analyst does which of the following?

Inspects the company's network for security breaches and recommends measures to prevent future attacks.

Jessica has connected her new printer to her Windows 10 computer, but Windows is not recognizing it. What should she do?

Install the latest driver

Carrol purchased a new printer and attached it to her workstation with a USB cable. The printer is powered on, but the computer does not recognize the printer. Which of the following should Carrol do NEXT to be able to send print jobs to the printer?

Install the latest printer driver

Which of the following problems would be the MOST difficult to troubleshoot?

Intermittent problem

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?

Internet

Which of the following terms describes an organization that connects users to the Internet?

Internet Service Provider

Steve has just installed a new thermostat in his home that allows him to monitor and adjust the temperature from his phone even while he's away. Which future IT trend is this part of?

Internet of Things (IoT)

Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?

Looping

Python is a general purpose programming language that is popular for creating websites and mobile applications. Python is known as a readable and user-friendly language. What does the following code do?

It gets input and produces output.

Which of the following BEST describes the ipconfig utility?

It is a utility that displays all current TCP/IP network configuration values.

Which of the following BEST describes a flowchart?

It is a visual representation of the logic in a program.

Which of the following BEST describes Computer Science (CS)?

It is the study of computers and computing concepts.

Which of the following BEST describes a customer relationship management (CRM) system?

It organizes notes, activities, and metrics into one system that works altogether.

Which of the following BEST describes the ping utility?

It sends a single packet to a specified network address and then waits for a reply.

Which of the following describes the declarative programming paradigm?

It uses a domain-specific language (DSL) to instruct the program what needs to be done.

If you select a file on the desktop and press "Delete" on your keyboard, what happens to the file?

It's moved to the Recycle Bin

Which of the following are primary sources? (Select two.)

Jane Austen's Pride and Prejudice, The United States Constitution

anice installed a printer on her computer and shared it with Steve. Steve configured the printer on his computer and was able to print a test page. Later on that day, Steve attempts to print but gets an error that the printer is not responding. Which of the following would be the MOST LIKELY reason for this?

Janice has turned off her computer

Which of the following would be responsible for resetting a user's password?

Level 1 support technician

When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals?

Line graph

What is the name of the protocol suite used on the Internet?

TCP/IP

Which of the following is data temporarily stored on?

Memory chips

Which of the following is NOT an example of a web browser?

Microsoft Word

Which of the following allows for access to the internet without either a Wi-Fi or a wired connection?

Mobile data

Which of the following is primarily operated by a touchscreen?

Mobile device

Which of the following devices would MOST likely have a 4G connection?

Mobile phone

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?

Modem

Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?

Modify

Which of the following job tasks would be something a QA specialist would do?

Monitor software development in order to maintain a high-quality product.

Which of the following is the system administrator's MOST important task?

Monitoring and maintaining system security

John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in?

Mosaic

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used?

Multifactor authentication

A technician assists Joe, an employee in the Sales department, who needs access to the client database by granting Joe administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?

Principle of least privilege

Which component is responsible for reformatting print jobs so that the printer can understand and process them?

Print driver

Windows stores print jobs in a temporary file on the hard drive. What is this file called?

Print queue

A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?

Programmatic access

What is the collective name for creations that are not the intellectual property of anybody?

Public Domain

Which method should be used to search for an exact phrase?

Put the search terms in "quotes"

Which of the following can be used to ask a database questions and receive the data we're looking for?

Queries

Which of the following is a lossless compression algorithm?

Run-length encoding

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened.Which of the following email protocols is being used?

S/MIME

Mary needs to view all records from the Clients table. Which command should she use?

SELECT * FROM Clients

Mary needs to view the records from the Clients table that pertain to Travis. Which command should she use?

SELECT * FROM Clients WHERE name = Travis

Which of the following digital communication media does NOT require a connection to the Internet?

SMS

What protocol is used to send email messages from a mail client to a mail server?

SMTP

What is the computer language that makes relational databases work?

SQL

Which of the following is used on a wireless network to identify the network name?

SSID

Which of the following protocols can be enabled so email is encrypted on a mobile device?

SSL

Which of the following is a Digital Millennium Copyright Act (DMCA) provision that protects ISPs from being held liable for the copyright infringement others who use their systems commit?

Safe Harbor

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet?

Satellite

Which of the following methods will NOT open a file from the desktop?

Single-click the icon

Which of the following is something a computer scientist would do?

Solve problems in areas like robotics

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _________.

Spam

What is the name of the menu in the bottom left corner of the Windows environment?

Start Menu

Which tab in Task Manager can be used to manage programs that load with Windows?

Startup

Which of the following provides a computer system with the ability to retrieve and manipulate data at a future time?

Storage

The flow of goods and services from the producer to the consumer is known as which of the following?

Supply chain

In Windows PowerShell, which key can be used to autocomplete a command?

Tab

Which of the following is the BEST reason to search for articles in an online academic database?

The sources are more likely to be peer reviewed

Which of the following is both an advantage and disadvantage of using cryptocurrencies?

They allow for complete privacy.

Which of the following is a disadvantage of notebook systems?

They are more expensive.

Which of the following BEST describes expert systems?

They are programs designed to solve complex problems in specific domains.

What is the biggest benefit to using a DHCP server in a large network?

They save time for the network administrator.

Which of the following statements is true regarding a network technician?

They troubleshoot reported problems and assist users in resolving network-connection issues.

Which of the following statements is true regarding a network architect?

They typically require an industry certification in network design and implementation.

Which of the following would be a reason a company would outsource their IT support?

To cut costs

Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use?

Tracert

A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use?

Trademark

Which of the following exist to help consumers know what products they're buying?

Trademarks

Which of the following is something that an Information Systems (IS) professional would do?

Turn information into meaningful decisions

Which type of college would you attend to earn a bachelor's degree?

University

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?

World Wide Web

Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?

VPN

Jessica is currently editing a commercial she helped create. Which of the following is MOST LIKELY her profession?

Video production specialist

Which of the following careers typically requires at least a bachelor's degree in telecommunications?

Video production specialist

Which of the following technologies can be used to make a phone call over an Internet connection?

VoIP

A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. Which of the following wireless encryption standards should be used?

WPA2

Which of the following provides security for wireless networks?

WPA2

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?

WPA2 and AES

Which of the following is a disadvantage of web applications?

Web applications can carry a monthly or yearly fee.

Which of the following was the most widely used personal computer application until the mid-90s?

Word processing

What is the term for code that keeps running as long as a certain condition is met?

While loop

All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not?

Wikis

Which of the following operating systems require a file extension to execute a program?

Windows

Which software is Microsoft's anti-malware product that is preinstalled on most new computers?

Windows Defender

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features.Which of the following would BEST protect your computers?

Windows updates


Kaugnay na mga set ng pag-aaral

Lippincott chapter 14 the client having surgery missed question

View Set

AC Circuit Analysis Fourth Block

View Set