comptia

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What does this pseudocode declare?declare MinutesPerHour as Number = 60 A) A constant B) An array C) A variable D)A primary key

A) A constant A constant is a specific identifier that contains a value that does not change within the program. In this example, the value of MinutesPerHour is always 60 and will not change. --------------------------------------------------------------A variable contains a value that can change during the execution of the program. There is no reason to ever change the MinutesPerHour identifier after its declaration. --------------------------------------------------------------An array is a type of identifier that can reference multiple values; it's a set of elements. MinutesPerHour is a single identifier. --------------------------------------------------------------A primary key is an element of a database, not a pseudocode identifier.

What is true about firewalls? A) A firewall provides a way to restrict access to a computer or network. B) A firewall needs to block all outside access to a computer, creating a barrier (or wall) of protection around it. C) Firewalls are physical devices that have to be connected to the computer for protection against threats. D) Computers connected to the Internet need to have several host firewalls running for complete protection.

A) A firewall provides a way to restrict access to a computer or network A firewall restricts access to a computer or network to a defined list of hosts and applications, by blocking or allowing specific IP (Internet Protocol) addresses and port numbers. --------------------------------------------------------------A firewall can be set up to block all outside access to a computer, but its purpose is to offer protection while allowing the computer to be connected to the Internet, which means that some hosts and/or applications need to be on the "approved" list.One type of firewall is a hardware firewall, which is a dedicated appliance with the firewall installed as firmware. -------------------------------------------------------------- Other types of firewalls are software applications. --------------------------------------------------------------More than one host firewall running at the same time can conflict with each other.

A home office with 3 networks uses devices, which include 2 desktops, 4 laptops, 5 smartphones, 3 tablets, and a wireless printer. What device switches the communications between the wired and wireless networks in this office? A) Access point B) Modem C) Switch D) Router

A) Access point An access point creates a Wi-Fi wireless network between computers and mobile devices equipped with suitable adapters, and also switches communications between the wired and wireless networks. --------------------------------------------------------------A switch connects four or eight computers together in an Ethernet LAN (Local Area Network) using RJ-45 network ports and twisted-pair cabling. --------------------------------------------------------------A modem connects the wired and wireless network clients to the Internet via a WAN (Wide Area Network) link, by transmitting frames across the WAN link. --------------------------------------------------------------A router connects the wired and wireless network clients to the Internet via a WAN link, by forwarding packets between the local network and the Internet.

A Customer object has a field called EmailAddress. Other programs need to have frequent access to this field. What is the best way to set up this field? A) As a property of the Customer object B) As an array of variables across all programs C) As an attribute of the Customer object D) As its own object

A) As a property of the customer object Object properties represent a way of accessing a field publicly, instead of the overhead of using methods. Properties allow external code to ask the object to show or change the value of one of its fields. --------------------------------------------------------------Object attributes are private variables which other programs can not access directly. An object needs to have a method that allows another part of the program to access a field, adding extra overhead to the process. -----------------------------------------------------------Setting up the Email Address field as its own object adds unnecessary overhead and duplication of information. It is much easier to set it up as a property of the Customer object. --------------------------------------------------------------An array of variables is an inefficient way to store data, compared to objects.

Which wireless Internet service does a computer use when it connects by tethering? A) Cellular radio B) Satellite C) Radio frequency D) Wi-fi

A) Cellular radio Tethering is when a cell phone, which uses cellular radio service, shares its Internet connection with a computer that has no other means of Internet access. -------------------------------------------------------------A computer that needs to connect to the Internet by tethering to a cell phone has no other means of Internet access, such as wi-fi. --------------------------------------------------------------Radio Frequency is a means of provisioning a wireless local network using Wi-Fi standard equipment. While this isn't a means of Internet service provision in itself, it is a means for a client to connect to a wireless router offering Internet access. --------------------------------------------------------------A computer that needs to connect to the Internet by tethering to a cell phone has no other means of Internet access, such as a satellite link.

A web browser is an example of productivity software. What type of software is an email client? A) Collaboration software B) Open source software C) Business software D)Productivity software

A) Collaboration software With collaboration software, multiple users can work together on the same file or project. Email software allows users to compose, send, and receive messages from others, and is considered to be collaboration software. --------------------------------------------------------------Productivity software refers to applications that help users complete typical office tasks. A web browser can be used for information and research, and is considered to be productivity software. --------------------------------------------------------------Specialized business software is designed to assist with a particular business process or consumer demand, not general office functions and tasks covered by productivity software. --------------------------------------------------------------Open source software makes the program code used to design it available to the public. There are open source email clients, as well as those with proprietary code.

A table in a relational database receives imported data from a text document. In what format does the table store the new data? A) In a structured way B) As key/value pairs C) In an unstructured way D) In a semi-structured way

A) In a structured way Relational databases store information in a structured way, regardless of how that data gets into the database. This structure provides easy access to the information, along with flexibility over which data to access. --------------------------------------------------------------Unstructured data is information that does not have a pre-defined data model or is not organized in a pre-defined manner. Unstructured data provides no rigid formatting of the data, but when a relational database imports unstructured data, it becomes structured data within the database. --------------------------------------------------------------Semi-structured databases lack the structure of formal database architecture, but they have metadata: associated information helps identify the raw unstructured data. --------------------------------------------------------------A key/value pair database is a means of storing the properties of objects without predetermining the fields used to define an object.

Which of the following does NOT encrypt web page data? A) Mobile device encryption B) Secure Sockets Layer (SSL)/Transport Layer Security (TLS) C) Hypertext Transfer Protocol Secure (HTTPS) D) A transport encryption protocol

A) Mobile device encryption Data at rest means that the data is in some sort of persistent storage media. In this state, it is usually possible to encrypt the data using techniques such as mobile device encryption. --------------------------------------------------------------With data in transit (or data in motion), such as web page data, the data can be protected by Secure Sockets Layer (SSL)/Transport Layer Security (TLS). --------------------------------------------------------------With data in transit (or data in motion), such as web page data, the data can be protected with a transport encryption protocol. --------------------------------------------------------------When a web browser communicates with a secure Hypertext Transfer Protocol Secure (HTTPS) server, it accepts the server's digital certificate to use its public key to encrypt communications.

Which of the following will NOT help a network administrator avoid service unavailability due to one or more disks failing? A) Network redundancy B) Fault tolerance C) Contingency plan D) Redundant Array of Independent Disks (RAID)

A) Network redundancy Network redundancy provides fault tolerance to the connections to the network, if a network adapter fails, but will not avoid unavailable service if one or more disks fail. --------------------------------------------------------------Combining hard disks into an array of disks can help to avoid service unavailability due to one or more disks failing. A Redundant Array of Independent Disks (RAID) offers a variety of fault tolerant solutions. --------------------------------------------------------------To help protect against losing access to a computer system when a component fails, you must implement fault tolerance. Fault tolerant systems are those that contain additional components to help avoid single points of failure. --------------------------------------------------------------Vulnerabilities in critical workflows and resources can be mitigated by creating contingency plans and resources that allow the system to be resilient to failures and unexpected outages.

What is the difference between DropBox and OneDrive? A) OneDrive is built into the Windows OS. B) DropBox can be operated with a smartphone app. YOU WERE INCORRECT C) DropBox is built into the Windows OS. D) OneDrive is a cloud-based storage solution.

A) OneDrive is built into the Windows OS. OneDrive is a cloud storage client that is built into the Windows 10 OS (Operating System), and can be accessed via File Explorer. There is also OneDrive for Business, for users to store, sync, and share work files in the cloud. --------------------------------------------------------------Both OneDrive and DropBox are cloud-based storage solutions. --------------------------------------------------------------DropBox is not built into the Windows OS; it is an online file hosting service that offers cloud storage, file synchronization, personal cloud, and client software. --------------------------------------------------------------Both OneDrive and DropBox can be operated with an app for the smartphone or tablet.

What is the main cause of memory leaks? A) Programming errors B) Outdated software C) Damaged memory chips D) Operating system upgrades

A) Programming errors Memory leaks refer to Windows memory loss, caused by a program or an app. This occurs when an application does not release memory when it's done with it, eventually causing a system slowdown. --------------------------------------------------------------If the software that is outdated and no longer supported has proper memory management in the code, then it would not cause more leaks than current but badly written programs. --------------------------------------------------------------Damaged memory chips cause problems, but memory leaks refer specifically to memory losses due to software programs incorrectly managing memory allocation. --------------------------------------------------------------Upgrading the operating system can be a cause of memory leaks, with an increase in memory usage by the new drivers. Operating system upgrades are done less frequently than everyday use of programs that cause leaks.

A user needs to back up a 6 GB (GigaByte) video file from a Windows desktop to a new 64 GB flash drive. An error message warns that the file cannot copy over to the flash drive, due to file size limitations. What does the user need to do? A) Reformat the flash drive into NTFS. B) Reformat the flash drive into FAT32. C) Increase the size of the flash drive's partition. D) Reformat the flash drive into HFS

A) Reformat the flash drive into NTFS. FAT32 (File Allocation Table, 32-bit version) is used for formatting removable drives and disks, by default, as it provides the best compatibility between different types of computers and devices. FAT32 allows for maximum file size of 4 GB, so the drive needs to be reformatted into NTFS (New Technology File System) which allows file sizes of up to 16 ExaBytes. ------------------------------------------------------------- The flash drive is already formatted as FAT32 by default.HFS ------------------------------------------------------------- (Hierarchical File System) is used for Apple Mac computers, so a flash drive using this format does not work with Windows systems. ------------------------------------------------------------FAT32 allows a maximum partition size of 32 GB, but each file can only be 4 GB, so increasing the size of partitions will not help.

A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup? A) Settings/Devices B) Devices and Printers C) Device Manager D) Device Drivers

A) Settings/Devices In Windows 10 version 1803 and newer, the location for the basic user-configurable settings for peripheral devices is the Devices page within the Settings app. --------------------------------------------------------------In Windows 7, Windows 8, and early versions of Windows 10, Devices and Printers is the location for the basic user-configurable settings for peripheral devices attached to the computer. --------------------------------------------------------------Device Manager is the page used to perform functions such as updating device drivers or uninstalling devices, not setting a device to be the default. --------------------------------------------------------------Device Drivers is not a page in Windows. Drivers are accessed from the Device Manager page.

An essential part of troubleshooting is to establish a plan of action to eliminate the root cause without destabilizing some other part of the system. What needs to be in the plan of action? A) Steps required to implement the solution B) Cost analysis of resolving the problem vs. ignoring it C) Recommendations for a workaround D) Details outlining every occurrence of the problem

A) Steps required to implement the solution A plan of action should contain the detailed steps and resources required to implement the solution. --------------------------------------------------------------In most situations, it is not necessary to provide details outlining every occurrence of the problem, as part of the troubleshooting process. If such details are required, they are not part of the plan of action. --------------------------------------------------------------There are typically three solutions to any problem: repair, replace, or ignore. The decision as to whether or not repairing or replacing is cost-effective does not necessarily involve a cost analysis, but a simple judgement call. --------------------------------------------------------------If the solution to the problem is to ignore it, then it may help to have recommendations for a workaround.

In addition to making a copy of an entire database, a program can invoke the SQL (Structured Query Language) BACKUP command to work at which level? A) Table B) Application C) Record D) Field

A) Table Most database management systems provide stored procedures that invoke the BACKUP and RESTORE commands at a database or table level. -------------------------------------------------------------- The BACKUP command does not work at the field level. If some fields need to have a backup without the entire table, the administrator can make another version of the table with just those fields, and use the BACKUP command on the new table. --------------------------------------------------------------The BACKUP command does not work at the record level. If some records need to have a backup without the entire table, the administrator can make another version of the table with just those records, and use the BACKUP command on the new table. --------------------------------------------------------------Applications are collections of programming code, and not part of a database.

For enterprise networks with very large amounts of data to backup, which is best to implement? A) Tape drives B) Cloud storage only C) Use of personally owned devices D)Peer-to-Peer (P2P) network

A) Tape drives Enterprise networks with large amounts of data to backup may use more specialized media, such as tape drives. --------------------------------------------------------------An online Peer-to-Peer (P2P) network is one where, instead of a central server, each client contributes resources to the network. Most companies discourage use of P2P file sharing software on corporate networks. --------------------------------------------------------------Portable devices (e.g., smartphones, USB sticks, and media players) pose a threat to data security; they facilitate file copying. Some companies try to prevent staff from bringing such devices. --------------------------------------------------------------It is a good idea to use a combination of backup storage methods for on-site and off-site backups. You could back up often to locally attached storage or network-attached storage (NAS) and then copy backups to a cloud storage off-site.

Why would a programmer create a function instead of a procedure? A) The process which calls the function needs to receive back a return value. B) The function needs to include a nested loop, which does not work in a procedure. C) Functions compile more efficiently. D) Procedures do not exist in some programming languages.

A) The process which calls the function needs to receive back a return value. The key difference between a procedure and a function is that a function can return a value to whatever called it, whereas a procedure cannot. --------------------------------------------------------------Nested loops work the same way in both functions and procedures. --------------------------------------------------------------There are many factors which affect code efficiency, including ways to program function calls. But using a function over a procedure for this reason is not a consideration. --------------------------------------------------------------Functions and procedures exist in all programming languages. Some languages make very little distinction between the two, and consider functions to be procedures which return a value.

What is the fastest downlink speed that the typical cable Internet service providers offer to their customers? A) 24 Mbps B) 100 Mbps C) 1.2 Gbps D)52 Mbps

B) 100 Mbps Most cable service providers offer downlink Internet connection speeds of up to about 100 Mbps in their premium packages. --------------------------------------------------------------Cable based on the DOCSIS (Data Over Cable Service Interface Specification) version 3.0 supports downlink speeds of up to about 1.2 Gbps, but cable service providers do not normally offer that to their customers. --------------------------------------------------------------Residential DSL services support downlink speeds of up to 24 Mbps. --------------------------------------------------------------VDSL (Very High Bit Rate DSL), which is implemented by fiber optic services as part of the FTTC (Fiber to the Curb) solution, supports downlink speeds of up to 52 Mbps.

What's a true statement about variables? A) A variable contains a value that must change during the execution of the program. B) A variable can have any data type that the programming language supports. C) A program has to declare all variables before using them. D)Each procedure must assign an initial value, when declaring variables.

B) A variable can have any data type that the programming language supports A variable is used in a program to access a program element. Its value can be a text string, a number, or any other data type if the programming language supports it. --------------------------------------------------------------It's good practice to declare all variables in a program before using them, but not all programming languages require it. It is often possible to use undeclared variables, although this can make code harder to read and more prone to errors. --------------------------------------------------------------A variable contains a value that can change during the execution of the program, but it can also remain unchanged. --------------------------------------------------------------Variables can have initial value assignments, but it is not mandatory.

What type of software is project management software? A) Productivity software B) Business software C) Collaboration software D) Networking software

B) Business software Project management involves breaking a project into a number of tasks and assigning responsibilities, resources, and timescales to ensure the completion of those tasks. Specialized business software such as Microsoft Project assists with this process by visualizing task timelines and dependencies, and recording information about task properties and progress. --------------------------------------------------------------Productivity software refers to applications that help users complete typical office tasks. Project management is a more complex task with many functions, and requires specialized business software. --------------------------------------------------------------Collaboration software means that multiple users can work together on the same file or project. Working on a project is very different from managing a project, and requires different type of software. --------------------------------------------------------------Networking software is for administrators to deploy, manage, and monitor a network.

What indicates that a website has a highly trusted certificate? A) URL starting with "https" B) Green padlock icon in front of address bar C)Padlock icon in front of address bar D) Green address bar with no icon

B) Green padlock icon in front of address bar if the website has a certificate that's valid and trusted, a padlock icon is shown. If the certificate is highly trusted, the address bar (with the padlock) is green. Website owners have to go through a more rigorous identity validation procedure for a high assurance certificate. ------------------------------------------------------------- A padlock icon in front of the address bar indicates that a certificate is valid and trusted, but not at the highest level. -------------------------------------------------------------- Without a padlock icon, the color of the address bar has no special meaning. -------------------------------------------------------------- HTTPS (Hypertext Transfer Protocol Secure) encrypts and decrypts user page requests as well as the pages that are returned by the Web server. It is not an indication of a valid and trusted certificate.

If a system goes down, which of these will NOT help recover from data loss due to a natural disaster? A) Syncing the data B) Implementing a Redundant Array of Independent Disks (RAID) C) Replication between data centers D) Restoring the data from file backups

B) Implementing a Redundant Array of Independent Disks (RAID). Redundant Array of Independent Disks (RAID) is not a substitute for backups. A disaster, such as a fire, that destroys the whole array will result in total data loss without a backup. --------------------------------------------------------------To guard against data loss from a natural disaster, you must consider implementing service and data replication between multiple data centers. -------------------------------------------------------------- If a system goes down, if a component or system is not available, redundancy means that the service can failover to the backup either seamlessly or with minimum interruption. Data can either be restored from backup or by switching over to another system, to which data has been replicated. --------------------------------------------------------------To guard against data loss from a natural disaster, data should be synchronized between servers and between sites.

A wireless network in a small home office generated poor signal quality. The signal improved when an old cordless phone stopped working. What problem did the cordless phone cause when it was active? A) Attenuation B) Interference C) Modulation D) Bluetooth signal overlap

B) Interference Wireless radio frequency interference can be caused by many different things, including fluorescent lighting, microwave ovens, cordless phones, and heavy machinery. --------------------------------------------------------------Attenuation is the loss of strength of the wireless signal, and is determined by the distance between the wireless client and access point. --------------------------------------------------------------Modulation is the process of converting data into radio waves; it is what wireless networks use to send data. --------------------------------------------------------------Bluetooth uses the 2.4 GHz frequency range but a different modulation technique, so interference is not common. Even if the cordless phone was used with a Bluetooth-enabled headset, it is unlikely that the signal overlapped with the wireless network.

What type of language consists primarily of a series of nested tags? A) Scripting B) Markup C) Scripted D) Query

B) Markup A markup language is a means of making data in a document accessible to a program, via a series of nested tags that describe the structure and/or meaning of the tag contents. --------------------------------------------------------------Query languages are designed to retrieve specific records from a dataset, using commands which are a structured form of the English language. --------------------------------------------------------------Scripting languages support the automation and configuration of a particular operating system, using a variety of commands ranging from 2-letter abbreviations with single-letter options, to full words. -------------------------------------------------------------Scripted languages are general purpose interpreted programming languages such as JavaScript or Perl. They use extensive vocabularies specific to each programming language.

What is the easiest way to install a standard mouse, and configure it to use basic settings? A) Get the disk with a special driver. B) Use Control Panel/Settings. C) Download online driver from the manufacturer. D) Use the Mouse app on the smartphone.

B) Use Control Panel/Settings. A standard mouse does not need a special driver for installing. Basic settings can be configured using the Mouse applet in Control Panel/Settings. --------------------------------------------------------------To access and configure extra buttons on some mice, the manufacturer's driver is needed. The driver is on a disk included with the mouse. --------------------------------------------------------------In the absence of a disk with the driver, it can usually be found online on the manufacturer's website, and downloaded for installation. The driver is needed to access and configure extra buttons on some mice, not to install the mouse and configure basic settings. --------------------------------------------------------------There are apps on the smartphone which enable the smartphone to operate as a mouse, but they are not used for installing and configuring a standard mouse.

Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks? A) Application B) Internet C) Transport D) Network interface

B) internet Internet layer encapsulates packets into Internet datagrams and deals with routing between different networks, using IP (Internet Protocol), ARP (Address Resolution Protocol), and ICMP (Internet Control Message Protocol). --------------------------------------------------------------Link or Network Interface layer is responsible for putting data (packaged in a unit called a frame) onto the physical network. Communications on this layer take place only on a local network segment and not between different networks. --------------------------------------------------------------Transport layer uses TCP (Transport Control Protocol) or UDP (User Datagram Protocol) to provide communication sessions between computers. --------------------------------------------------------------Application layer is the top level of the architecture which contains protocols that provide the communications formats for exchanging data between hosts, such as transmitting an email message or requesting a web page.

Which numbers does this pseudocode display? declare i as Number = 10 Do While i > 0 If i < 7 Then i = i - 1 End If print i i = i - 1 Loop A) 9, 8, 7, 6, 5, 4, 3, 2, 1, 0 B) 10, 9, 8, 7, 6, 5, 4, 3, 2, 1 C) 10, 9, 8, 7, 5, 3, 1 D)9, 7, 5, 3, 1

C) 10,9,8,7,5,3,1 This pseudocode loops backwards from 10, decreasing the value of i inside the loop. Until i is less than 7, it decreases by 1, after that it decreases by 1 twice per loop (once inside the branch, and once outside the branch). --------------------------------------------------------------If the pseudocode did not include the branch, then every number from 10 to 1 would be printed. --------------------------------------------------------------If the pseudocode did not include the branch, and the print command followed the command to decrease i, then every number from 9 to 0 would be printed. --------------------------------------------------------------If the branch condition was always true (for example, "if i <= 10") then only the odd numbers from 9 to 1 would be printed.

What is a true statement about interpreters and interpreted programming languages? A) Interpreted programming languages only run on one platform. B) An interpreter converts machine code into a human-readable format. C) An interpreter converts the program into machine code at runtime. D) Interpreted programming languages can run on any platform.

C) An interpreter converts the program into machine code at runtime. With interpreted languages, the program does not need to compile prior to running. It runs within the context of an interpreter, which is a computer program that directly executes instructions written in an interpreted programming language. Interpreter code is usually in a lower-level language than the programs that they interpret, for better performance. --------------------------------------------------------------The tools which convert machine code into a human-readable format are called disassemblers or decompilers, not interpreters. --------------------------------------------------------------Interpreted programming languages can run on platforms for which there is an interpreter. --------------------------------------------------------------Interpreted programming languages can run on a variety of platforms, as long as there is a corresponding interpreter.

What should a user do to protect sensitive information from malware, when working on a public workstation? A) Set up a firewall. B) Enable pop-up blocker. C) Clear the browser cache. D) Disable cookies.

C) Clear the browser cache Using a public workstation carries a risk of malware, which can capture sensitive information. A good practice is to clear the browser cache before shutting down or logging off, and not to allow passwords to be cached. -------------------------------------------------------------- Disabling first-party cookies is likely to leave a website unusable. Public workstations usually have layers of protection against intrusive settings changes. The options for deleting stored cookies are usually in the same place as clearing the cache, so can be done at the same time. -------------------------------------------------------------- A pop-up blocker can protect the computer from adware, but not malware. -------------------------------------------------------------- Public workstations typically do not allow users to make system changes, such as setting up a firewall.

What is the term for the processing speed of 1 billion cycles per second? A) GBps B) Bps C) GHz D) MHz

C) GHz GHz stands for Gigahertz, which is 1000 million or 1 billion (1,000,000,000) cycles per second, when measuring a computer's internal clock and the speed at which its processors work. --------------------------------------------------------------MHz stands for Megahertz, which is 1 million (1,000,000) cycles per second, when measuring a computer's internal clock and the speed at which its processors work. --------------------------------------------------------------Bps stands for Bytes per second when measuring the rate at which data is transferred between components in the computer or between computers over a network. --------------------------------------------------------------GBps stands for Gigabytes per second (1,000,000,000 bytes per second) when measuring the rate at which data is transferred between components in the computer or between computers over a network.

What's a true statement about markup languages? A) Markup languages are only used to program web pages. B) Markup languages can only be used on one platform. C) Markup languages are not programming languages. D) Markup languages are not human-readable.

C) Markup languages are not programming languages. A markup language is not a programming language but a means of making data in a document accessible to a program. A markup language, such as HTML (HyperText Markup Language) or XML (eXtensible Markup Language), defines a series of nested tags that describe the structure and/or meaning of the tag contents. --------------------------------------------------------------Human-readable data is encoded as text, and machine-readable data (machine code) is the binary representation. Markup language documents contain text data. --------------------------------------------------------------Markup language documents are used by programming languages on different platforms. --------------------------------------------------------------Web pages can display HTML files, but in general, markup language documents present data to programs for processing. These programs include web pages and applications, as well as locally installed applications on other platforms.

What do the instructions in this pseudocode do? declare Animal(9) as String For i = 0 to 9 If i > 5 Then Animal(i) = "dog" Else Animal(i) = "cat" End If Next A) Set the first 5 elements of the array Animal to "dog", and the rest to "cat". B) Set the first 5 elements of the array Animal to "cat", and the rest to "dog". C) Set the first 6 elements of the array Animal to "cat", and the rest to "dog". D) Set the first 6 elements of the array Animal to "dog", and the rest to "cat".

C) Set the first 6 elements of the array Animal to "cat", and the rest to "dog" This pseudocode loops 10 times. It branches to set the array Animal to "dog" only when i is more than 5, which happens with values 6 through 9. For the first 6 values (0 through 5), it branches to set the array to "cat". --------------------------------------------------------------If the condition was "i >= 5", then it would set the first 5 elements of the array to "cat", and the rest to "dog". --------------------------------------------------------------If the condition was "i < 5", then it would set the first 5 elements of the array to "dog", and the rest to "cat". --------------------------------------------------------------If the condition was "i >= 5", then it would set the first 6 elements of the array to "dog", and the rest to "cat".

A user installs a software application for free, and it displays a 30-day countdown until the user must register it and receive additional features. What type of license is this? A) Open source B) Subscription model C) Shareware D) Freeware

C) Shareware Shareware is software that is free of charge for a limited period, usually for the purpose of evaluation. After this period, the user must register it to continue using it, usually for a fee. Often there are extra features and support available after registration. -------------------------------------------------------------- With subscription-based licensing, organizations pay a per-user monthly fee to get access to the software. In this model, regular upgrades are part of the subscription. --------------------------------------------------------------Freeware is software that is available for free, without time limits. There are usually restrictions for its use, such as no redistribution or resale. --------------------------------------------------------------Open source is software that makes the program code available, so that other programmers can investigate the program and make it more stable and useful.

What does the motherboard determine about a desktop computer? A) Price B) Lifespan C) Upgrade potential D) Width and height

C) Upgrade potential The motherboard determines the upgrade potential of the computer. A component incompatible with the motherboard, due to physical size or being of more modern technology, cannot be installed. --------------------------------------------------------------The motherboard is a fairly small size compared to a typical desktop computer. Additional components determine the computer's overall physical size. --------------------------------------------------------------The lifespan of a computer is determined by many factors, including the workload placed on it and the care given to it. Computers with very outdated technology can remain in workable condition for a very long time. --------------------------------------------------------------The price of the computer depends on all of its parts. A motherboard can have many slots for components which are unfilled to keep the price low.

Which of the following best describes containers and identifiers? A) Identifiers have attributes, properties, and methods. B) An identifier is a type of container. C) A container is a set of constants. D) A container is a type of identifier.

D) A container is a type of identifier A container is a term for a special type of identifier that can reference multiple values (or elements). One example of a container construct is a simple array. --------------------------------------------------------------An identifier is a way to access a program element, such as a stored value, class, method, or interface. An identifier can be a variable, a constant, or a container. --------------------------------------------------------------A container is a set of values, not limited to constants. --------------------------------------------------------------Objects have attributes, properties, and methods. An identifier can reference an object, or other types of elements which do not have attributes, properties, or methods.

How does an object store its attributes? A) As comments B) As a vector C) As public variables D) As private variables

D) As private variables Attributes are values and data types that define the object. The object stores the attributes as fields or private variables. --------------------------------------------------------------Other programs cannot access or change the attributes of an object directly, the way that they can with public variables. -------------------------------------------------------------Most programming languages support container types called vectors that can grow or shrink in size as elements are added or removed. Vectors are specialized types with their own rules and limitations, and objects do not use them to store their attributes. --------------------------------------------------------------Programmers use comments in code to assist with maintaining it, not for attributes of objects.

How do the CPU (Central Processing Unit) and storage devices in a computer process data? A) As integers and decimals B) As bits and bytes C) As characters and strings D) As zeros and ones

D) As zeros and ones. The CPU and storage devices in a computer only process data as ones and zeros. These hardware components have no conception of what the data mean. --------------------------------------------------------------Bits and bytes are units of measure, used to describe computer storage. A bit can represent the value zero or one, which is what the hardware components work with. A byte is a multiple of 8 bits. --------------------------------------------------------------Integers and decimals are data types used in computer programs, but they are a collection of ones and zeros from the hardware standpoint. --------------------------------------------------------------Characters and strings are data types used in computer programs, but they are a collection of ones and zeros from the hardware standpoint.

How is business software different from productivity software? A) Business software is for conducting business meetings, and productivity software is for increasing productivity. B) Business software is for managers and executives, and productivity software is for general office staff. C) Business software is for business owners, and productivity software is for employees. D) Business software is for a particular process, and productivity software is for general office functions.

D) Business software is for a particular process, and productivity software is for general office functions. Productivity software covers general office functions and tasks, while business software is designed to assist with a particular business process or consumer demand. --------------------------------------------------------------Both business and productivity software are used by managers, executives, and general office staff. An executive may use presentation software to show projections to the shareholders, while the office employees use specialized database software to generate daily reports. --------------------------------------------------------------Both business and productivity software are used by business owners and their employees. Specialized accounting software is used by employees in the payroll department and by small business owners to generate invoices. --------------------------------------------------------------Business software is designed to assist with a particular business process or consumer demand, which can fall into any category of a business, including increasing productivity.

Which of the following SQL (Structured Query Language) commands can run with just one parameter? A) CREATE VIEW B) CREATE INDEX C) CREATE TABLE D) CREATE DATABASE

D) CREATE DATABASE The CREATE DATABASE command requires just one parameter: the name of the database. Other parameters which configure the new database are optional. --------------------------------------------------------------The CREATE TABLE command requires the name of the table, as well as at least one column name and its specifications. --------------------------------------------------------------The CREATE INDEX command requires the name of the index, the table that will have the index, and which column(s) are in the index. --------------------------------------------------------------The CREATE VIEW command requires the name of the view, and the contents of the view, such as a query from a table with some criteria.

A relational database has a table, Customers, which contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What's the best way to keep track of customers' purchases in this database? A) Extend the Customers table with new fields "PurchaseDate", "PurchaseDescription" and "PurchaseAmount". B) Create a new table, Purchases, with fields "Customer", "Date", "Description" and "Amount". C) Create a new table, Purchases, with fields "PurchaseDate", "PurchaseDescription" and "PurchaseAmount". D) Create 2 new tables: Products and Purchases.

D) Create 2 new tables: Products and Purchases. A proper relational database design has as little redundancy as possible in the data. In this example, customers can make multiple purchases, and multiple customers can purchase the same type of product. This relationship calls for a 3-table design: a list of customers, a list of products, and a cross-reference of which customers purchased which products. --------------------------------------------------------------A 2-table design, with a list of customers and a list of each of their purchases, means there is a duplication of product information. --------------------------------------------------------------A Purchases table, without a foreign key field to connect with the Customers table, is not a good relational model. --------------------------------------------------------------Adding new fields to the Customers table with information about a purchase creates redundancy when a Customer makes multiple purchases.

A database administrator needs to extend a table with another column. What method contains the command to do that? A) DCL (Data Control Language) B) DML (Data Manipulation Language) C) XML (eXtensible Markup Language) D) DDL (Data Definition Language)

D) DDL (Data Definition Language) DDL (Data Definition Language) commands refer to SQL (Structured Query Language) commands that add to or modify the structure of the database. DDL commands include ALTER TABLE, to add columns to a table. --------------------------------------------------------------DML (Data Manipulation Language) commands refer to SQL commands that access or modify the contents of the database. --------------------------------------------------------------DCL (Data Control Language) mainly deals with the rights, permissions, and other controls of the database system, with commands such as GRANT and REVOKE. --------------------------------------------------------------XML (eXtensible Markup Language) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.

An attacker taps into a wired network to intercept unencrypted wireless transmissions. Which of the following is a type of confidentiality concern that describes this activity? A) Impersonation B) Social engineering C) Snooping D) Eavesdropping

D) Eavesdropping Eavesdropping/wiretapping/sniffing is snooping on data or telephone conversations as they pass over the network. It can be relatively easy for an attacker to "tap" a wired network or intercept unencrypted wireless transmissions. --------------------------------------------------------------Snooping is any attempt to get access to information on a host or storage device (data at rest) that you are not authorized to view. --------------------------------------------------------------Social engineering refers to getting users to reveal confidential and personally identifiable information. --------------------------------------------------------------Impersonation is an integrity concern where a person will attempt to figure out a password or other credentials to gain access to a host.

What does the term "hybrid laptop" mean? A) Laptop that can be used like a phone B) Laptop that can be used like a desktop C) Laptop that can be used like a gaming console D) Laptop that can be used like a tablet

D) Laptop that can be used like a tablet Hybrid laptops can be used like a tablet or a traditional laptop. They need touchscreens to have tablet functionality. Some laptops are converted into tablets by flipping the screen. Others have a detachable keyboard, which functions as a cover for the screen. --------------------------------------------------------------Laptops can be used to make video calls, but it is not a replacement for the phone and not a hybrid laptop. --------------------------------------------------------------Laptops can be used like a desktop, and bigger models are often called "desktop replacements," but they are not hybrid laptops. --------------------------------------------------------------For a laptop to be used like a gaming console, it needs to have a powerful CPU and graphics processor, as well as a gaming pad, but that does not make it a hybrid laptop.

What's the difference between scripted and scripting languages? A) Scripted languages only run on one platform. B) Scripting languages have to transform the code to an executable binary. C) Scripted languages have to transform the code to an executable binary. D) Scripting languages are for configuring an operating system.

D) Scripting languages are for configuring an operating system. Scripted languages are general purpose interpreted programming languages such as JavaScript or Perl. Scripting languages support the automation and configuration of a particular operating system, i.e., the Windows Command Prompt, Windows PowerShell, or Linux Bash. -------------------------------------------------------------- Both scripted and scripting languages are interpreted languages, which means that the program does not need to compile prior to running. -------------------------------------------------------------- Scripted and scripting languages run within the context of an interpreter, a computer program that directly executes instructions written in an interpreted programming language. --------------------------------------------------------------Scripted and scripting languages can run on platforms for which there is an interpreter, with each scripting language geared toward a particular operating system.

The person reporting a problem is likely to be the main source of information about it. However, if this is insufficient to successfully troubleshoot, what is a good next step to take? A) Escalate the problem. B) Use a product Knowledge Base. C) Suggest workarounds. D) View log files.

D) View log files. If the information provided about the problem is insufficient to successfully troubleshoot, the next step is to consider other sources, such as viewing system, application, or network log files, or monitoring other support requests to identify similar problems. --------------------------------------------------------------Once sufficient information is gathered, then it may be necessary to use a product Knowledge Base or a web/Internet search tool to research the symptoms. --------------------------------------------------------------If none of the available resources are sufficient to diagnose or resolve the problem, it may be necessary to escalate it. --------------------------------------------------------------If one troubleshooting method does not yield results, it may be time to suggest workarounds which can provide a way for the user to continue to work with the system while the problem is being resolved.


संबंधित स्टडी सेट्स

Applied Statistics 2 (Cumulative Final)

View Set

International Business Law, Chapter 12 - Imports, Customs, & Tariff Law

View Set

9.27.F - Test: 3rd Quarter DOES NOT HAVE MODULE 9, STUDY SET

View Set

MGT 391 Quantitative Analysis Mid-Term Exam

View Set

CFP - 5111 Textbook Questions I got wrong

View Set