Domain 1: Concepts and Terminlogy

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following lists the basic computing and processing steps in order? Input/output, processing, and storage Input, retrieval, output, and storage Input, processing, output, and storage Input, retrieval, processing, and storage

Input, processing, output, and storage

Dan is using Search on his web browser to find Clearwater Beach, which could be in Alabama or Florida. Which of the following search phrases would help Dan find the beach location MOST effectively?

"Clearwater Beach" Alabama OR Florida

Mark wants to include a string in his computer program that lets users know they have selected the correct option. He wants to include the option in double quotes. However, the entire string also needs to be delimited by double quotes. Which of the following is the string Mark should use to include the option in double quotes? "Congratulations! \"Launch Audit\" is the correct option." "\Congratulations! "Launch Audit" is the correct option.\" "\Congratulations! "Launch Audit" is the correct option.\" \"Congratulations! "Launch Audit" is the correct option.\"

"Congratulations! \"Launch Audit\" is the correct option."

Emily is using Search on her web browser to try and find a recipe for pecan pie. However, she wants to make sure it's a recipe from her home state of Mississippi. Which of the following search phrases will help her find exactly what she needs? "Mississippi pecan pie" Mississippi OR pecan pie +Mississippi pecan pie -Mississippi pecan pie

"Mississippi pecan pie"

Which of the following transfer rates is the FASTEST? 181 Mbps 1,282 Kbps 1.24 Gbps 1,480 Mbps

1,480 Mbps 1,480 Mbps is equal to 1.48 Gbps, and so it is the fastest transfer rate listed because it is greater than 1.24 Gbps. In summary, 1,480 Mbps > 1.24 Gbps > 181 Mbps > 1,282 Kbps.

Which of the following statements BEST describes a firewall?

A firewall restricts the flow of data between hosts and networks by checking data packets to make sure they are safe. A firewall restricts how hosts and network applications are accessible to each other by checking each bit of data (called a packet) that tries to enter your network to make sure that it is safe. A firewall is software. It is not an attached peripheral device. A firewall is not designed to block all data traffic (although it can). It is designed to filter packets of information flowing between computers and networks to make sure they are safe. A firewall can filter data packets flowing between a computer and the internet, but it is also designed to filter all data traffic flowing to and from a computer from any network.

Arrange the following from smallest to largest. Megabyte, gigabyte, terabyte, kilobyte

A kilobyte is the same as 1024 bytes. A megabyte is about a million bytes, or 1024 kilobytes. A gigabyte is about a billion bytes, or 1024 megabytes. A terabyte is about a trillion bytes, or 1024 gigabytes.

What common method do file systems use to keep track of which users can read, write, move, or delete a file or folder?

ACL File systems use an Access Control List, or ACL, for each file and folder in the system. The ACL keeps track of which users can read, write, move, or delete each file. Most file systems allow users to share folders saved on their hard drive with users who are connected to the same local network or by setting up a network share. However, this is not a system for keeping track of rights to a file.

A system administrator is troubleshooting a company financial application that has several problems, including locking up on Windows 10 laptops, failing to save automatically, and allowing access to unauthorized users. Which of the following is the BEST approach to solving these problems?

Approach each problem separately.

What is the first step of the data analytics process?

Collecting raw data

What is the general purpose and use of software? Create knowledge from information Create information from data Create data from information Create data from knowledge

Create information from data

Which of the following are specifically designed to help protect digital products? (Select two.)

Digital Rights Management (DRM) tools Technological Protection Measures (TPM) Digital Rights Management tools are specifically designed to help protect digital products and help control the use, modification, and distribution of copyrighted data. Technological Protection Measures are specifically designed to help protect digital products and help control the use, modification, and distribution of copyrighted data. Fair Use is an exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public. Fair use does not provide protections for digital products. A trademark is any word, picture, or symbol that is used to distinguish a good from other similar goods--for example, the name of a company or the logo used by a company. Trademarks do not specifically provide protections for digital products. The US Patent and Trademark office processes patent licenses and registered trademarks, but does not specifically focus on protections for digital products.

The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step? Establish a plan of action Establish a theory of probable cause Duplicate the problem, if possible Identify symptoms

Duplicate the problem, if possible

A developer is creating an application that requires a value to be stored with decimal precision. Which of the following data types should be used for the variables that will store these values?

Float The float data type is used for numbers that have decimal places. It's called "float" because the computer stores two values behind the scenes: the digits in the number and the location of the decimal point, which can "float" around to any location within the number. The integer data type is used for whole numbers. The Boolean data type consists of exactly two values: True and False. The string data type is used to store more than one character, such as a word or sentence.

While both the integer data type and float data type can be used for whole numbers, what advantage does the float data type have over integers? Floats can store a word or sentence. Floats can include decimal places. Floats use less storage than an integer. Floats represent two values - True or False.

Floats can include decimal places.

Which of the following processing speeds runs at one billion cycles per second? GHz MB GB MHz

GHz

Dave, a videographer, wants to purchase a network switch that will improve the performance of transferring video from his video editing workstation to a backup server. Which of the following transfer rates currently available to consumers is the FASTEST for network switches? Tbps Kbps Mbps Gbps

Gbps

What is the number of instructions a CPU can perform per second measured in?

Hertz CPU cycles are measured in hertz. Data transfer is measured in bits per second. Data size is measured in bytes. Resistance is measured in ohms.

Which of the following notational systems is MOST likely used to represent a MAC address? Decimal Hexadecimal Octal Binary

Hexadecimal

Which of the following lists the throughput rates (bits per second) from slowest to fastest? Gbps, Kbps, Mbps, Tbps Kbps, Mbps, Gbps, Tbps Tbps, Gbps, Mbps, Kbps Mbps, Kbps, Tbps, Gbps

Kbps, Mbps, Gbps, Tbps

Which of the following is available in Windows to provide usage restrictions for data files? Settings App NTFS Permissions Windows Registry Disk Management

NTFS Permissions

Jonathan has a computer with an older PC bus interface and is getting a fiber optic connection for his home office. Which of the following BEST describes the processing speed environment?

The older PC bus runs at a MHz processing speed, while the fiber optic network equipment runs at a GHz processing speed.

Which of the following are features of using an Excel table to store data? (Select two.) Range Graphing Data correlation Total row Column sorting

Total row, column sorting

Which of the following are examples of input devices? (Select two.) Touch Screens Projectors Speakers Monitors Keyboards

Touch Screens Keyboards

A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which protection should they use?

Trademark

Which of the following exist to help consumers know what products they're buying?

Trademarks

The legal protection of rights to ideas and discoveries is called a copyright. What are the other ways that intellectual property can be legally protected? (Select two.) Trademarks Patents Open-source Fair use Public domain

Trademarks Patents

How many bits are in a single byte?

eight

Which of the following encoding schemes would MOST likely be used to represent an emoji? ASCII Hexadecimal Unicode Binary

Unicode

In the decimal number system, you can think of each digit representing a place (or column) in the number. For example, in the decimal number 652, the two, the five, and the six are all in different places and each place can be expressed as 10 to a specific power. Which power of 10 does 6 in the above example represent?

10 to the second power

Which is the correct binary representation of the number 22?

10110

Which of the following is the binary number equivalent of the hexadecimal number F5C8? 1010010011010001 1101000110100100 1101001110111001 1111010111001000

1111010111001000 D

A consumer wants to add a hard drive to their computer to store video from their camera. Which of the following is the storage capacity of a modern hard disk drive (HDD) purchased from a computer store?

3 terabytes

Which of the following is the best definition of a bit?

A single 1 or 0 in a digital signal

Which of the following are security controls you can use to help protect the data on your network? (Select three.) Fault tolerance Natural language processing Transaction processing Access controls Backups Analytics Reporting

Backups Access controls Fault tolerance

When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements?

Bar graph

The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ________________.

Big data

A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this? Float Integer String Boolean

Boolean

April, a programmer, wants to convert the binary number 1111001101011011 to a hexadecimal number. What is the recommended first step to perform this conversion manually? Break up the binary number into chunks of two digits. Break up the binary number into chunks of four digits. Convert the binary number to a decimal number. Find the hex value for each chunk of binary digits.

Break up the binary number into chunks of four digits.

Sharon works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers. Which of the following is the first step Sharon needs to perform in the analysis process?

Capture the data.

A developer is writing a program that will store the value of a single character. Which of the following data types will work BEST to store this value? Boolean Char String Single

Char Char is used to hold a single character. String is used to store multiple characters. A string can contain a single character; however, char is the best choice when the value the developer is storing will always be a single character. Single is a numeric data type used to contain floating-point values. Boolean is used to store a true or false value and cannot be used to store a single character.

Which of the following is the first thing you should do in the troubleshooting process when trying to identify possible causes of a problem?

Check for obvious or common issues.

Which of the following is the first thing you should do in the troubleshooting process when trying to identify possible causes of a problem? Check with others to see if they can duplicate the problem. Check for obvious or common issues. Divide and conquer to find a possible cause. Test your theories to verify the cause of the problem.

Check for obvious or common issues.

When you are identifying possible causes of a problem, which of the following are troubleshooting methods you should try? (Select two.) Consider using multiple approaches. Test any theories you might have. Research knowledge bases and the internet. Escalate the problem. Check for simple, obvious, and common problems.

Consider using multiple approaches Check for simple, obvious, and common problems

A network engineer needs to convert the binary number 1101100110110011 to a hexadecimal number. Which of the following is the correct hexadecimal number? D3B9 D9B3 C9D3 D3C9

D9B3 You can calculate the conversion by breaking down the binary number into sets of four digits (1101, 1001, 1011, and 0011). Then you convert each set of four digits into its hexadecimal equivalent (1101 = D, 1001 = 9, 1011= B, and 0011 = 3).

describes the process of turning data points into useful information

Data analytics

A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect?

Data and information

Martina works for a data analytics consulting firm. She is currently helping an international trading company promote a new line of organic beauty supplies to customers. Martina is determining whether the 25-36 age group of customers purchases organic products from the company more frequently than inorganic products. Which of the following describes this step of the analytics process? Data correlation Product design Risk assessment Data query

Data correlation

Which of the following BEST describes computer data processing?

Data in memory is converted to information.

Which of the following describes using data analytics to inform business operations? Data-driven business decisions Research analysis Market analysis Raw data analysis

Data-driven business decisions

A network host has an IPv4 address of 192.168.12.155. Which of the following notational systems is used to represent this IP address? Binary Hexadecimal Decimal Octal

Decimal

Given the numerical value 1010101.11, which of the following number systems is MOST likely represented?

Decimal 1010101.11 represents a decimal number with two decimal places that consist of 1s and 0s. The binary number system uses two digits - 1 and 0. In practice, binary numbers do not use decimal points. In fact, the word "decimal" in decimal point refers to the decimal number system. The hexadecimal number system uses sixteen digits - the numerals 0 through 9 and the letters A through F. Octal is a base-8 number system and uses the digits 0 through 7.

As part of the troubleshooting process, you need to establish a plan of action to remove the root cause of the problem without destabilizing other parts of the system. What should your plan of action include? Escalating the problem Detailing steps and the resources needed to implement the solution Identifying possible causes of the problem Addressing multiple problems individually

Detailing steps and the resources needed to implement the solution

A system administrator has a problem with a network server dropping its connection to the network on a regular basis. The administrator decides to list all the probable causes for the issue and then test each one individually to try and isolate what is causing the issue. Which of the follow BEST describes this troubleshooting technique? Identify the problem. Divide and conquer. Create an action plan. Document the process.

Divide and conquer.

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed? Establish a plan of action to solve the problem and identify potential effects Verify full system functionality and, if applicable, implement preventive measures Document findings/lessons learned, actions, and outcomes Implement the solution or escalate as necessary

Document findings/lessons learned, actions, and outcomes

A system administrator has been troubleshooting a problem with a database server not providing the information necessary to generate reports from a customer application. The administrator has tried testing several theories, but nothing seems to resolve the issue. Which of the following describes the MOST effective action the administrator should take next to try to resolve the problem? Consult with other system administrators in the company. Keep a record of the testing attempts to include in the action plan. Research the company knowledge base and the internet. Escalate the problem to the database engineer.

Escalate the problem to the database engineer.

While troubleshooting a problem with a computer, a technician has tested and confirmed a theory on how to fix the problem. Which of the following is the NEXT step the technician should perform?

Establish a plan of action to solve the problem and identify potential effects

Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology? Test the theory to determine the cause Establish a plan of action to solve the problem Identify the problem Establish a theory of probable cause

Establish a theory of probable cause

A network administrator is following the troubleshooting process to try and resolve a third-party application problem. After researching the issue and backing up the system, what is the next step in the troubleshooting process for the administrator?

Establish a theory of probably cause.

Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?

Fair Use

Identifying the problem is the first step in CompTIA's troubleshooting model. Which of the following are tasks associated with this step? (Select three.) Question the obvious Escalate as necessary Identify symptoms Duplicate the problem Question users Consider multiple approaches

Identify symptoms Duplicate the problem Question users

A software developer is creating a variable to hold whole numbers and will perform numeric operations on the values stored in that variable. Which of the following data types is the BEST for this purpose?

Integer The integer data type is used for whole numbers. These include both positive and negative numbers, as well as zero. A float is used for numbers that contain decimal precision and would not be the best choice for whole numbers because whole numbers do not require decimal precision. String is used to store multiple characters. Boolean is used to store a true or false value.

An employee submitted a support ticket stating that her computer will not turn on. Which of the following troubleshooting steps should you take first? (Select two.) Make sure the power cord is plugged into the wall. Make sure the surge protector is turned on. Open the computer and replace the power supply. Make sure the keyboard and mouse are plugged in. Use a multimeter to test the power supply.

Make sure the power cord is plugged into the wall. Make sure the surge protector is turned on.

Which of the following does a computer use to make sure that people, hardware, and software can interface with each other?

OS

One option that a computer has for the information gathered in data processing is to return information to the user. Which of the following BEST describes this process? Peripheral device Output Speaker Input

Output

Which of the following makes sure that all the computer system hardware is in working order before loading the operating system? Basic Input/Output System (BIOS) Unified Extensible Firmware Interface (UEFI) Device drivers Power-On Self-Test (POST)

POST

Which of the following accurately describes the characteristics of patents? (Select two.) Patent holders use a symbol (such as a logo) to make it easy for people to know who created their invention. Anything that is owned by a patent holder is called intellectual property. Patent holders are required to provide the public with details about how their invention works. Patent holders can prevent other people from making or selling their patented invention for a limited time. Patents are automatically given to patent holders without the need to apply for the patent.

Patent holders are required to provide the public with details about how their invention works. Patent holders can prevent other people from making or selling their patented invention for a limited time.

significant difference between and a trademark

Patents exist to protect creators, while trademarks exist to protect consumers.

Which of the following tools would you use to check connectivity between two computers?

Ping The ping command verifies connectivity between two nodes on a network. TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is the suite of protocols that facilitate internet communication. Dynamic Host Configuration Protocol (DHCP) is a network management protocol that handles assigning IP addresses on a network. The tracert command shows the exact path a packet takes between two hosts on different networks.

You are troubleshooting a malfunctioning notebook computer. Nothing appears on the LED display when the system is powered on. Which of the following is the BEST step to try first? Replace the motherboard Calibrate the battery Replace the video card Plug in an external monitor

Plug in an external monitor

When Jacob first starts his computer, he hears several warning beeps and nothing else happens. Which of the following is sending out the beeps?

Power-On Self-Test (POST)

Mary is a data analyst for a large pharmaceutical company. The company wants to know how their new organic line of over-the-counter cold relief medications is being perceived by customers and what they can do to better promote the product. Mary has collected a significant amount of raw data and has analyzed it to find connections and links between the data points. The insights are significant, and now she needs to inform company management. What is Mary's next step in the data analytics process?

Provide meaningful reporting with a system that includes search features, charts, and graphs.

What is the collective name for creations that are not the intellectual property of anybody?

Public Domain

Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis?

Reports Forms, tables, and queries are other key features of Microsoft Access. However, they do not provide the data analysis that reports can offer.

Greg is a network administrator for a medical supply company and has identified a problem with an access control list (ACL) failing to filter out data packets that have been restricted. What is the next step Greg should take to troubleshoot the ACL problem?

Research knowledge bases and the internet for information related to the problem.

Which of the following are exclusively associated with copyright protection? (Select three.) Right to lend a work Right to make derivatives of a work Right to use a trademark Right to reproduce a work Right to apply for a patent Right to reproduce small excerpts of a work Right for anyone to display a work

Right to lend a work Right to make derivatives of a work Right to reproduce a work Copyright includes the rights to reproduce, lend, and make derivatives of a work. Fair use is an exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public. It is not exclusive to copyright protection. The right to use a trademark is simply the ability to use any word, symbol, or picture to distinguish a good from other similar goods. It is not part of copyright protection. The right to apply for a patent is available to inventors to receive a temporary monopoly, or protection, on their invention. It is not part of copyright protection.

You're troubleshooting a computer running Windows 10. The operating system has halted and a blue screen has been displayed on the monitor with an error message. Which of the following is the MOST likely first step that should be taken in troubleshooting the issue?

Search for the error in Microsoft's knowledgebase.

Firewalls, data encryption, backups, and passwords are designed to protect computing devices. These technologies are all examples of what?

Security controls

Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations? Statistical tools and formulas Data points Data-driven business decisions Databases

Statistical tools and formulas

Which of the following provides a computer system with the ability to retrieve and manipulate data at a future time? Microchip Transistor Processing Storage

Storage

Which of the following BEST describes what a kilobyte is a measurement of?

Storage space

As a software developer, you need to create a variable to store postal codes. Which data type would you MOST likely use? String Integer Boolean Float

String

Which of the following Unicode character encoding standards is MOST commonly used for building web pages? Correct Answer: UTF-8 UTF-16 UTF-32 UTF-64

UTF-8

A system administrator has completed the entire troubleshooting process. Some employees at the office were plugging their Ethernet cable into the wrong port and not getting access to network resources. Although the administrator tested the solution, a couple weeks later other employees begin help tickets for the same issue. Which of the following BEST describe what the administrator might have missed doing during the troubleshooting process?

Taking preventative actions

Which of the following throughput transmission units is frequently used when linking data centers, cities, and countries? Incorrect response: Mbps Tbps Kbps Gbps

Tbps

The first step in data analytics is to collect raw data and summarize the information. What is the next step in data analytics?

The analysts use statistical tools and formulas to look for trends, patterns, and data correlations.

A customer has brought a computer in to be repaired. He said he thinks that the sound card has stopped working because no audio is produced when music, video, or DVDs are played. Which troubleshooting step should you take first? (Select two.)

Verify that the volume isn't muted. Verify that speakers are plugged into the correct jack and are powered on.

The basic (and smallest) unit of computer information is the bit (binary digit). Memory and file sizes are commonly measured in multiples of bits. What is the first multiple of a bit called? Decimal Kilobyte Kbps Byte

byte

When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals?

line graph

A user has entered a search string into an application and clicked on the search icon. Which of the following is the NEXT step in the computing process?

processing


संबंधित स्टडी सेट्स

Anatomy Ch. 51: Summarized Neurovascular Structures of the Upper Limb

View Set

NURS1410: Unit II Enteral and Parenteral Nutrition NCLEX style questions

View Set

History 800B Lesson 12 - Reconstruction

View Set

Econ 201 - The market forces of supply and demand (CH 4)

View Set

NC TYPES OF INDIVIDUAL LIFE INSURANCE

View Set

Music appreciation test 2 AUBURN UNIVERSITY

View Set

Guided Readings 4-5 World History

View Set

Ch. 11 Aggregate Demand/Aggregate Supply

View Set

A+P Chapter 11 Cardiovascular System

View Set